You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
osuuu LightPicture 1.2.2 version is vulnerable to a stored Cross-Site Scripting (XSS) attack. The vulnerability exists in the system's settings where users with the ability to upload images are allowed to upload SVG files by default.
Details
The vulnerability arises because the system does not sufficiently sanitize the uploaded SVG files. SVG files can contain embedded JavaScript code, which, if not properly validated and sanitized, can be executed in the context of the user's browser when the image is viewed. This can allow an attacker to execute arbitrary JavaScript code within the browser of a user who views the maliciously crafted SVG image.
/public/install/lp.sql:
POC
To exploit this vulnerability, an attacker can upload a specially crafted SVG file containing JavaScript code. The following is an example of a POST request that can be used to upload an SVG file containing a stored XSS payload:
Summary
osuuu LightPicture 1.2.2 version is vulnerable to a stored Cross-Site Scripting (XSS) attack. The vulnerability exists in the system's settings where users with the ability to upload images are allowed to upload SVG files by default.
Details
The vulnerability arises because the system does not sufficiently sanitize the uploaded SVG files. SVG files can contain embedded JavaScript code, which, if not properly validated and sanitized, can be executed in the context of the user's browser when the image is viewed. This can allow an attacker to execute arbitrary JavaScript code within the browser of a user who views the maliciously crafted SVG image.
/public/install/lp.sql:
POC
To exploit this vulnerability, an attacker can upload a specially crafted SVG file containing JavaScript code. The following is an example of a POST request that can be used to upload an SVG file containing a stored XSS payload:
After uploading we get a url: /LightPicture/2024/12/b676a4d5f8b6caf2.svg
The text was updated successfully, but these errors were encountered: