Skip to content

Cross Site Scripting Issue in PrestaShop Using File Upload Functionality #20306

Closed
@p1nk15amak

Description

An issue is discovered in PrestaShop version 1.7.6.7 under the Catelog feature when using the file-upload functionality for uploading the Files for various products. This issue exists because it fails to implement file content checks and improperly handles the output, resulting in cross-site scripting attack that leads to cookie stealing or malicious actions.

Steps to Reproduce

  1. Go to Catelog feature
  2. Click on File component and add the details accordingly.
  3. Create a file with .html extension and enter the payload <script>alert('XSS!!');</script>within it. (Here its, uplod.html)
  4. Upload the file
  5. Login as customer and click on the file uploaded for the particular product.
  6. You can see the XSS payload gets executed.

CVSS Score:
CVSS:3.0/AV:N/AC:H/PR:H/UI:R/S:C/C:H/I:H/A:N

SS1
SS2
SS3

Metadata

Assignees

No one assigned

    Labels

    No change requiredResolution: issue closed because expected as is

    Type

    No type

    Projects

    No projects

    Milestone

    No milestone

    Relationships

    None yet

    Development

    No branches or pull requests

    Issue actions