Description
Next Click Ventures RealtyScript 4.0.2 fails to properly sanitize CSV file uploads, allowing attackers to inject malicious scripts through filename parameters in multipart form data. Attackers can upload files with XSS payloads in the filename field to execute arbitrary JavaScript in users' browsers when the file is processed or displayed.
Problem types
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
Product status
References
www.exploit-db.com/exploits/38496 (ExploitDB-38496)
www.zeroscience.mk/en/vulnerabilities/ZSL-2015-5269.php (Zero Science Lab Disclosure)
www.vulncheck.com/...-scripting-via-csv-file-upload-filename (VulnCheck Advisory: RealtyScript 4.0.2 Stored Cross-Site Scripting via CSV File Upload Filename)