Stored XSS via HTML File Upload and Viewing
A stored XSS vulnerability was identified in version 0.2.2 of the software, allowing attackers to upload HTML files with XSS payloads that execute when viewed through the /view endpoint. This issue has not yet been patched.
Available publicly on Dec 13 2024
Threat Overview
The vulnerability arises from improper neutralization of input during web page generation, specifically when HTML files containing XSS payloads are uploaded and subsequently viewed. This can lead to the execution of arbitrary JavaScript code in the context of the user's browser, potentially exposing sensitive data, enabling session hijacking, or redirecting users to malicious sites.
Attack Scenario
An attacker uploads an HTML file containing a malicious script via the /api/upload/image endpoint. When a user views this file through the /view endpoint, the script executes in the user's browser, allowing the attacker to steal session cookies, redirect the user to a malicious site, or perform other malicious actions.
Who is affected
Users of the software version 0.2.2 who upload and view HTML files through the /view endpoint are affected by this vulnerability.
Technical Report
Want more out of Sightline?
Sightline offers even more for premium customers
Go Premium
We have - related security advisories that are available with Sightline Premium.