An ethical hacker contacted me saying there is an XSS vulnerability on my site and shared a video of uploading a fake image file which triggered a prompt.
He said this type of code injection attack is carried out by an attacker by entering HTML code or other client script code into a site. This attack will be considered as if it came from the site. As a result of this attack, the attacker can bypass security on the client-side, get sensitive information, or save dangerous applications.
I am not sure to what extent this is true but still like to report this given that some XSS bugs were fixed in the recent release.
▶🚶Reproduction steps
A prompt will appear. Screenshot attached.
📃Error log message
Some files couldn't be added
He said this type of code injection attack is carried out by an attacker by entering HTML code or other client script code into a site. This attack will be considered as if it came from the site. As a result of this attack, the attacker can bypass security on the client-side, get sensitive information, or save dangerous applications.
I am not sure to what extent this is true but still like to report this given that some XSS bugs were fixed in the recent release.
▶🚶Reproduction steps
- In notepad add following code
"><img src=x onerror=prompt(1);> - Save it under name "><img src=x onerror=prompt(1);>.jpg (Windows OS don't support this filename. Use android to rename)
- Upload to the file to chevereto
A prompt will appear. Screenshot attached.
📃Error log message
Some files couldn't be added