Phraseanet DAM Cross Site Scripting

Risk: Low
Local: No
Remote: Yes

# Exploit title: Stored XSS vulnerability in Phraseanet DAM Open Source software # Date: 10/10/2018 # Exploit Author: Krzysztof Szulski # Vendor Homepage: # Software Link (also VM): # Version affected: 4.0.3 (4.0.4-dev) and below # Version fixed: 4.0.7 # Proof of concept. Phraseanet is an Open Source Digital Asset Management software distributed under GNU GPLV3 license. Registered user (or even guest user, depends of configuration) can upload pictures, videos, pdfs or any other document. A crafted file name for uploaded document leads to stored XSS. In simplest form the name of the file would be: "><svg onload=alert(1)>.jpg or: "><svg onload=alert(document.cookie)>.jpg Please notice that the file name should start from double quotation mark. Once a picture will be uploaded it will pop up an alert window and keep popping up every time anybody will login to the website. Another example of more malicious usage would be this file name: "><svg onload=window.history.back()>.jpg From now on every attempt to login will end up with redirection one step back - to login page. Please be aware that this will not affect Chrome browser and other browsers built on chrome engine which has XSS filter built in.

Vote for this issue:


Thanks for you vote!


Thanks for you comment!
Your message is in quarantine 48 hours.

Comment it here.

(*) - required fields.  
{{ x.nick }} | Date: {{ x.ux * 1000 | date:'yyyy-MM-dd' }} {{ x.ux * 1000 | date:'HH:mm' }} CET+1
{{ x.comment }}

Copyright 2019,


Back to Top