By submitting this document, you accept to have read and consent to the Jobber Bug Bounty Program Terms and Conditions
A brief one line description of the issue.
Stored Cross-Site scripting vulnerability in ‘Update Profile Picture’ functionality
A detailed description of the issue along with the definition of the vulnerability type with all possible relevant details.
Cross-Site Scripting (XSS) attacks are a type of injection, in which malicious scripts are injected into otherwise benign and trusted websites. XSS attacks occur when an attacker uses a web application to send malicious code, generally in the form of a browser side script, to a different end user.
The consultant identified that the update profile picture is vulnerable to cross site scripting, it is possible to upload an image with a MIME type of `text/html` this is then stored on the user's profile as an XSS payload, the outline below demonstrates the steps taken to exploit and reproduce.
The affected URLs or area of the application where the issue exists.
A clear outline of the steps required to reproduce the issue along with appropriate evidence (screenshots, request/response body etc.)
POST /file/upload/ HTTP/1.1
Host: example.com
---snip----
-----------------------------900627130554
Content-Disposition: form-data;
name="stored_XSS.jpg"; filename="stored_XSS.jpg" Content-Type: text/html
<script>alert('JobberBugBounty')</script>
-----------------------------900627130554
HTTP/1.1 200 OK
Date: Sat, 13 Aug 2016 14:31:44 GMT
---snip---
{"url":"https://example.com/
56fc3b92159006271305543ef45a04452e8e45ce4/
stored_XSS.jpg?Expires=1465669904&Signature
=dNtl1PzWV&Key-Pair-Id=APKAJQWLJPIV25LBZGAQ",
"pk":"56fc3b92159006271305543ef45a04452e8e45ce4
/stored_XSS.jpg", "success": true}
https://example.com/56fc3b92159006271305543ef45a04452e8e45ce4/stored_XSS.jpg
The normal outcome of the steps to reproduce outlined above
The payload should be executed and should treat it as a normal string
The abnormal output due to the presence of the vulnerability
The payload is executed as shown in attached screenshot labelled step3.jpg, thus this demonstrates the issue is stored cross site scripting.
visit chrome://version/
top-right menu icon → ? "Help" → "About Firefox"
top-right cog → "About Internet Explorer"
… → "Settings" → scroll down
Explain who this issue affects? Is it everyone or just a select amount of users?
How do you fix the issue? What are the recommended remediation actions required to successfully fix the issue?
List of Pertinent applications, programs or tools used to discover the issue
Date and time testing took place & IP address at time of testing.
For more information on remediation steps check out reference [2]