[Stored XSS] Sync-In

Sync-In is a popular open-source file manager used by many individuals and teams. While exploring its features, I decided to test its security by attempting an XSS (Cross-Site Scripting) attack on the publicly available demo instance.

Steps to Reproduce:

1. Access the Demo Instance

      I started by accessing the official demo at https://demo.sync-in.com and logging in using the provided test credentials.

2. Upload an SVG File

      Next, I attempted to upload an SVG file containing embedded JavaScript. The upload was successful.

3. Render the SVG

      When I opened the file within the application, the SVG was rendered as an image, but the embedded script did not execute.

4. Open in New Tab

      Curious, I opened the rendered SVG image in a new browser tab.

5. XSS Triggered

      Once opened directly in a new tab, the embedded JavaScript executed, confirming the XSS vulnerability.


Outcome

I immediately reported the issue to the Sync-In team, who responded quickly and released a patch.

The vulnerability was resolved in v1.9.3. You can find the patch here:

https://github.com/Sync-in/server/releases/tag/v1.9.3

As a token of appreciation, I received a €50 bounty for my findings.

Comments

Popular posts from this blog

[XSS] Breaking ‘safe’ embeds via frame-src bypass

About Me

[BYPASS] IKEv2 Fortinet Misconfiguration