webPromedium

Lab 342 — CloudVault — Stored XSS via Malicious SVG Upload

hackadvisor

Task: CloudVault file sharing platform allows SVG uploads served raw with image/svg+xml MIME type; admin bot reviews reported content and has flag in non-HttpOnly cookie. Solution: upload SVG with embedded JavaScript, use same-origin comments API to exfiltrate admin's cookies when bot visits the raw SVG URL.

$ ls tags/ techniques/
svg_script_injectionadmin_bot_exploitationstored_xss_via_file_uploadsame_origin_data_exfiltrationapi_abuse_for_exfilnon_httponly_cookie_theft

🔒

Permission denied (requires tier.pro)

Sign in to access full writeups

Sign in with GitHub to continue. No email required.

$sign in

$ grep --similar

Similar writeups