Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2023-49052 PoC — Microweber 安全漏洞

Source
Associated Vulnerability
Title:Microweber 安全漏洞 (CVE-2023-49052)
Description:File Upload vulnerability in Microweber v.2.0.4 allows a remote attacker to execute arbitrary code via a crafted script to the file upload function in the created forms component.
Description
Microweber version 2.0.4 vulnerable to "Uploading Malicious Files" 
Readme
# CVE-2023-49052 - Microweber CMS v2.0.4 - Uploading Malicious Files

## Description
In version 2.0.4 of Microweber CMS where the file upload option is active in created forms, it is possible to send malicious `HTML` files, even when certain types of validations are applied in this field.

This vulnerability allows an attacker to upload files containing scripts that can lead to various malicious activities, such as stealing session cookies or login credentials, redirects, installing malware, among others.

## Fix Suggestion
Update to the latest version of Microweber.

## Steps to Reproduce:

**1)** In a Microweber CMS installation, create a page with a contact form and add the `File Upload` field.

**2)** Create a new file with the content below and save it as `poc.htm`:

```js
<svg></svg>
<html>
    <head>     
    </head>
    <body>
        <h1>Hi!</h1>
        <script>
            alert(document.cookie)
        </script>
    </body>
</html>
```

**3)** Access the form page and upload the created `poc.htm` file.
![step 3](img/1.jpg)

**4)** Now, to run the sent file, simply access `http://yoursite.com/userfiles/media/default/contact_form/poc.htm`

_(replace `https://yoursite.com` with the address of your test installation.)_

![step 4](img/2.png)

**Note**: please note that the above steps work even when there are some validation measures in the `File Upload` field such as “Image Files” and “Custom File Types” such as “jpg”.

### Reference
* [Microweber Releases v2.0.5](https://github.com/microweber/microweber/releases/tag/v2.0.5)
File Snapshot

[4.0K] /data/pocs/20cb9481adba8c4c1675f775554fcd1715220223 ├── [4.0K] img │   ├── [187K] 1.jpg │   └── [ 80K] 2.png └── [1.5K] README.md 1 directory, 3 files
Shenlong Bot has cached this for you
Remarks
    1. It is advised to access via the original source first.
    2. Local POC snapshots are reserved for subscribers — if the original source is unavailable, the local mirror is part of the paid plan.
    3. Mirroring, verifying, and maintaining this POC archive takes ongoing effort, so local snapshots are a paid feature. Your subscription keeps the archive online — thank you for the support. View subscription plans →