Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2023-44764 PoC — PortlandLabs Concrete CMS 跨站脚本漏洞

Source
Associated Vulnerability
Title:PortlandLabs Concrete CMS 跨站脚本漏洞 (CVE-2023-44764)
Description:A Cross Site Scripting (XSS) vulnerability in Concrete CMS before 9.2.3 exists via the Name parameter during installation (aka Site of Installation or Settings).
Description
Cross Site Scripting vulnerability in ConcreteCMS v.9.2.1 allows a local attacker to execute arbitrary code via a crafted script to the SITE from installation or Settings.
Readme
# ConcreteCMS Stored XSS v.9.2.1

## Author: (Sergio)

**Description:** Cross Site Scripting vulnerability in ConcreteCMS v.9.2.1 allows a local attacker to execute arbitrary code via a crafted script to the SITE parameter from installation or in the Settings.

**Attack Vectors:** Scripting A vulnerability in the sanitization of the entry in the Site of Installation or Settings allows injecting JavaScript code that will be executed when the user accesses the web page.

---

### POC:


In the installation process we add the payload in the SITE parameter:

![image](https://github.com/sromanhu/ConcreteCMS-Stored-XSS---Site_Installation/assets/87250597/a5dbbb11-9c2e-45e8-bfee-ff43dc07ec3c)





### XSS Payload:

```js
<img src=x:alert(alt) onerror=eval(src) alt='XSS Site'>
```


In the following image you can see the embedded code that executes the payload in the main web.
![image](https://github.com/sromanhu/ConcreteCMS-Stored-XSS---Site_Installation/assets/87250597/f9557aa6-886f-49f9-bbe6-946c17569303)



</br>

### Additional Information:
https://www.concretecms.com/

https://owasp.org/Top10/es/A03_2021-Injection/
File Snapshot

[4.0K] /data/pocs/0b0aa51e5a628d2859bee835b412e43cb75fa54a └── [1.1K] README.md 0 directories, 1 file
Shenlong Bot has cached this for you
Remarks
    1. It is advised to access via the original source first.
    2. Local POC snapshots are reserved for subscribers — if the original source is unavailable, the local mirror is part of the paid plan.
    3. Mirroring, verifying, and maintaining this POC archive takes ongoing effort, so local snapshots are a paid feature. Your subscription keeps the archive online — thank you for the support. View subscription plans →