You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
This vulnerability was detected using XBOW, a system that autonomously finds and exploits potential security vulnerabilities. The finding has been thoroughly reviewed and validated by a security researcher before submission. While XBOW is intended to work autonomously, during its development human experts ensure the accuracy and relevance of its reports.
Description
The application's file listing functionality is vulnerable to cross-site scripting due to improper escaping of filenames in the listing page. When a user uploads a file, its filename is stored and later displayed unescaped in the file listing table.
The vulnerability exists in the actionsFormatter within deliveries.js, where the filename is directly inserted into HTML. This allows an attacker to inject arbitrary HTML and JavaScript by uploading a file with a maliciously crafted name.
This is particularly dangerous as it's a stored XSS vulnerability - once an attacker uploads a file with a malicious name, any user who access to the file listing page will have the malicious JavaScript executed in their browser context.
Steps to reproduce
Log in to the application with valid credentials (admin/admin)
Upload a file with a malicious filename containing HTML/JavaScript payload:
e.g., "test<img src=x onerror=alert('XSS')>.zip"
Navigate to the file listing page
The JavaScript payload will execute
It is possible to automate the first to steps with the following code:
Disclaimer
This vulnerability was detected using XBOW, a system that autonomously finds and exploits potential security vulnerabilities. The finding has been thoroughly reviewed and validated by a security researcher before submission. While XBOW is intended to work autonomously, during its development human experts ensure the accuracy and relevance of its reports.
Description
The application's file listing functionality is vulnerable to cross-site scripting due to improper escaping of filenames in the listing page. When a user uploads a file, its filename is stored and later displayed unescaped in the file listing table.
The vulnerability exists in the actionsFormatter within deliveries.js, where the filename is directly inserted into HTML. This allows an attacker to inject arbitrary HTML and JavaScript by uploading a file with a maliciously crafted name.
This is particularly dangerous as it's a stored XSS vulnerability - once an attacker uploads a file with a malicious name, any user who access to the file listing page will have the malicious JavaScript executed in their browser context.
Steps to reproduce
e.g., "test<img src=x onerror=alert('XSS')>.zip"
It is possible to automate the first to steps with the following code:
Mitigations
Impact
This vulnerability has high impact because:
The text was updated successfully, but these errors were encountered: