Posted on June 22, 2025 ยท Category: XSS
Hi,
I discovered a reflected XSS vulnerability via file upload on a Sony subdomain.
Main application: https://*.*.*.sony.com/#/PATH1/PATH2
After uploading a file, the file gets hosted on:
https://*.*.*.sony.com/uploads/PATH1/bnUnlZzw_js_injected_xss.pdf
This link can be shared with any user, and when opened, the injected XSS payload executes.
https://*.*.*.sony.com/#/PATH1/PATH2
js_injected_xss.pdf
The file name or part of the PDF was reflected in the response without proper encoding, triggering the script.
Implement proper output encoding of filenames/paths in the response. Avoid reflecting user-generated input into the response without sanitization. Consider CSP and MIME type validation for uploaded files.
I was awarded swags for this report.