Skip to content

sromanhu/CVE-2023-44765_ConcreteCMS-Stored-XSS---Associations

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

4 Commits
 
 

Repository files navigation

ConcreteCMS XSS v2.2.18

Author: (Sergio)

Description: Cross Site Scripting vulnerability in ConcreteCMS v.9.2.1 allows a local attacker to execute arbitrary code via a crafted script to Plural Handle of the Data Objects from System & Settings.

Attack Vectors: Scripting A vulnerability in the sanitization of the entry in the Plural Handle of "Data Objects from System & Settings" allows injecting JavaScript code that will be executed when the user accesses the web page.


POC:

When logging into the panel, we will go to the "System & Settings - Data Objects." section off General Menu.

image

We edit the Entity field with the payload that we have created and see that we can inject arbitrary Javascript code in the Plural Handle field.

XSS Payload:

""><svg/onload=alert('PluralHandle')>

Then we add an association:

image

And we add the Type to Many to Many to add the payload to "Target Property Name and Inversed Property Name":

image

We execute the association created:

image

In the following image you can see the embedded code that executes the payload in the main web.

image


Additional Information:

https://www.concretecms.com/

https://owasp.org/Top10/es/A03_2021-Injection/

About

Cross Site Scripting vulnerability in ConcreteCMS v.9.2.1 allows a local attacker to execute arbitrary code via a crafted script to the Plural Handle of the Data Objects from System & Settings

Resources

Stars

Watchers

Forks

Releases

No releases published

Packages

No packages published