Skip to content

woshinibaba222/DoraCMS-File-Upload-Vulnerability

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

6 Commits
 
 

Repository files navigation

DoraCMS File Upload Vulnerability

Vulnerability Description

DoraCMS User Management allows the upload of avatars for any user, enabling the alteration of uploaded avatars to HTML files that can execute XSS statements. Additionally, it permits the insertion of malicious links into uploaded images, deceiving users into clicking and downloading malicious programs.

Affected Versions

DoraCMS version 2.1.8

Source Code Download Link

https://github.com/doramart/DoraCMS

Reproduction Steps:

Access the user management interface and randomly edit the details of a user.

1

Click on the avatar in the image and choose a picture to upload.

2 3

Modify the request packet as shown in the image. Change the file extension of the image to HTML in the request packet as shown in the picture.

4 5

Append XSS statements at the end; here, I will make the following selection. #Popup cookie

<script>alert(document.cookie)</script>

6

Continuously send. You can see that the upload was successful.

10

Click on the update button as shown in the picture.

7

Let's go back and review the request history in Burp. You can see the path to the logo. Now, concatenate the address and access it. http://127.0.0.1:8080/static/upload/images/20231123/1700705529363061526.html

8

XSS popup successful.

9

Attackers can also insert links they want system users to click into the image.

11

Upload successful.

13

Access http://127.0.0.1:8080/static/upload/images/20231123/1700707364548976301.html

12

This way, attackers can leverage the trust of users in the system to download malicious programs or perform other attacks.

About

No description, website, or topics provided.

Resources

Stars

Watchers

Forks

Releases

No releases published

Packages

No packages published