-
Notifications
You must be signed in to change notification settings - Fork 60
Description
Vulnerability details
A stored XSS vulnerability exists in the profile picture upload functionality on dev.near.org. The application allows users to upload SVG files as profile pictures, but it does not sanitize the contents of the SVG. This enables an attacker to inject malicious scripts, leading to the execution of JavaScript when the image is viewed.
[ Validation steps]
-
Navigate to the profile picture upload section on dev.near.org.
-
Create a malicious SVG file with embedded JavaScript. Example content:
Copy code
-
Upload the crafted SVG file as the profile picture or the background.
-
Once uploaded, open/view the profile image (e.g., in a browser or image link).
-
Observe that the JavaScript is executed, triggering the alert box.
-
here is the image link https://ipfs.near.social/ipfs/bafkreidroiiw35saf3n7cjhrbkqv6iiyocltkmbuxg7bl5fl5axou32rvu