BOOK THIS SPACE FOR AD
ARTICLE ADAfter thoroughly inspecting and exploring the website, I found the function responsible for changing the profile picture. This is one of my favorite functions because it often allows me to discover multiple vulnerabilities.
The first thing I attempted was uploading a shell.php file instead of a profile picture. However, I was unable to obtain a shell, despite trying again and using all the bypass techniques I knew. In the end, I couldn't succeed.
At that point, I didn’t give up, but I took a few hours to rest due to my continuous efforts to get the shell.
Afterward, I tried uploading an image in SVG format, and it worked. The website accepted images in this format. At that moment, I thought of three potential vulnerabilities I could exploit: XXE, Stored XSS, and SSRF.
I first attempted to find an XXE vulnerability, but unfortunately, I couldn’t exploit it either.
Then, I moved on to the Stored XSS vulnerability. I uploaded the SVG image, intercepted the request, injected my payload,
and continued with the image upload process. Afterward, I opened the image I had uploaded in a new tab.
And BOOOOOOOOOOOOOOOOOOM!
I successfully triggered Stored XSS.