-
Notifications
You must be signed in to change notification settings - Fork 731
php file upload and xss (security bug) #1122
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Comments
Are you going to fix these critical bugs? |
Hi @hasanali586q , thanks for reporting these issues. Issue number 1 has already been handled and cannot be reproduces in Can you provide step to reproduce issue number 2? |
Part 1 of this issue is the same as #1113 , fixed in I have received the video for part 2 of this issue. I will release a new version to fix it. |
XSS attack happens only when previewing images. Renaming any file to names like: I think it is much more safe to prevent saving XSS script by filtering file names. But it also occurs to me that symbols like So currently I do not filter these special symbols just yet. But I am open to discussion about whether it should be implemented or not. If you have any opinion, please comment here. |
It's possible to upload php file by changing extension of image with php code payload. While uploading file you can change extension of uploaded file to php and you can bypass mime type check by concatenating php code binarily to image file or to meta data of image.
More on video attached.
XSS - while renaming file, you can paste xss payload and it will be stored on the server and run on userside.
The text was updated successfully, but these errors were encountered: