You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Vulnerability details
A stored XSS vulnerability exists in the profile picture upload functionality on dev.near.org. The application allows users to upload SVG files as profile pictures, but it does not sanitize the contents of the SVG. This enables an attacker to inject malicious scripts, leading to the execution of JavaScript when the image is viewed.
[ Validation steps]
Navigate to the profile picture upload section on dev.near.org.
Create a malicious SVG file with embedded JavaScript. Example content:
Copy code
<script type="text/javascript">
alert(document.domain);
</script>
and paste it one note pad and save it as .svg file
Upload the crafted SVG file as the profile picture or the background.
Once uploaded, open/view the profile image (e.g., in a browser or image link).
Observe that the JavaScript is executed, triggering the alert box.
Vulnerability details
A stored XSS vulnerability exists in the profile picture upload functionality on dev.near.org. The application allows users to upload SVG files as profile pictures, but it does not sanitize the contents of the SVG. This enables an attacker to inject malicious scripts, leading to the execution of JavaScript when the image is viewed.
[ Validation steps]
Navigate to the profile picture upload section on dev.near.org.
Create a malicious SVG file with embedded JavaScript. Example content:
Copy code
Upload the crafted SVG file as the profile picture or the background.
Once uploaded, open/view the profile image (e.g., in a browser or image link).
Observe that the JavaScript is executed, triggering the alert box.
here is the image link https://ipfs.near.social/ipfs/bafkreidroiiw35saf3n7cjhrbkqv6iiyocltkmbuxg7bl5fl5axou32rvu
The text was updated successfully, but these errors were encountered: