Stored XSS in LibreOffice

Aayush kumar
2 min readAug 11, 2024

--

Without wasting any time, let’s dive in. Over time, I’ve realized that bug bounty hunting is a blend of luck and hard work. You don’t always have to put in a ton of effort — sometimes, bugs just fall into your lap.

One day, I was randomly surfing YouTube and suddenly I got a mail saying that LibreOffice had launched their bug bounty program on Intigriti, which is now closed. I immediately checked the scope, but since I wasn’t familiar with binary exploitation at the time, I decided to focus on the web assets.

After about 20 minutes, I noticed an interesting feature that allowed users to upload extensions. Additionally, there was an option to add screenshots of the extensions you created. Suddenly, I remembered a HackerOne report (https://hackerone.com/reports/964550) where the researcher was able to trigger an alert by including an XSS payload in a file.

You can read more about it here:https://shahjerry33.medium.com/xss-via-exif-data-the-p2-elevator-d09e7b7fe9b9

So I uploaded the payload : PNG

Lol”><script>alert(prompt(‘Xss By Bunny0417’))</script>
/-{IDATx E K s 9xd$# J %IR$ ( s 9Ñ evnv > q ;;;S U . = = ܿ BCb QHyԑEYՑ s$s T : x 8 إ }2` 0P @ ( j ( D J d %[

You have to find the reflection point to see the payload working which i cannot disclose for obvious reasons.But after finding it I saw my payload working :)

This was my first 4 digit bounty :)

BB TIP : Always keep an eye on new programs you can use this website — https://bbradar.io/ and always try to read hacker-one disclosed reports. Remember you cant find something that you don’t know about. Best of luck for your journey.

Sign up to discover human stories that deepen your understanding of the world.

Free

Distraction-free reading. No ads.

Organize your knowledge with lists and highlights.

Tell your story. Find your audience.

Membership

Read member-only stories

Support writers you read most

Earn money for your writing

Listen to audio narrations

Read offline with the Medium app

--

--

Responses (1)

Write a response