webPromedium

Lab 393 — ShareVault — Stored XSS via File Browser innerHTML

hackadvisor

Task: Express/Node.js file sharing platform renders uploaded filenames via innerHTML without sanitization; admin bot reviews reported files. Solution: stored XSS via malicious filename with img onerror handler, exfiltrate admin's non-HttpOnly cookie by uploading a new file with stolen data encoded in the filename via FormData+fetch.

$ ls tags/ techniques/
innerHTML_injectionstored_xss_via_filenamebase64_eval_payloadformdata_exfiltrationadmin_bot_trigger

🔒

Permission denied (requires tier.pro)

Sign in to access full writeups

Sign in with GitHub to continue. No email required.

$sign in

$ grep --similar

Similar writeups