目标达成 感谢每一位支持者 — 我们达成了 100% 目标!

目标: 1000 元 · 已筹: 1020

100%

CVE-2023-44766 PoC — PortlandLabs Concrete CMS 跨站脚本漏洞

来源
关联漏洞
标题:PortlandLabs Concrete CMS 跨站脚本漏洞 (CVE-2023-44766)
Description:PortlandLabs Concrete CMS是美国PortlandLabs公司的一个面向团队的开源内容管理系统。 PortlandLabs Concrete CMS v.9.2.1版本存在跨站脚本漏洞,该漏洞源于SEO-Extra功能存在跨站脚本(XSS)漏洞。
Description
Cross Site Scripting vulnerability in ConcreteCMS v.9.2.1 allows a local attacker to execute arbitrary code via a crafted script to the SEO - Header Extra Content from Page Settings. 
介绍
# ConcreteCMS Stored XSS v.9.2.1

## Author: (Sergio)

**Description:** Cross Site Scripting vulnerability in ConcreteCMS v.9.2.1 allows a local attacker to execute arbitrary code via a crafted script to the SEO - Extra from Page Settings.

**Attack Vectors:** Scripting A vulnerability in the sanitization of the entry in the "Header Extra Content" of "SEO" allows injecting JavaScript code that will be executed when the user accesses the web page.

---

### POC:


When logging into the panel, we will go to the "Page Settings - SEO".

![image](https://github.com/sromanhu/ConcreteCMS-Stored-XSS---SEO-Extra/assets/87250597/4c5f46f7-368e-4c0a-828f-20b763319c58)




### XSS Payload:

```js
<img src=x:alert(alt) onerror=eval(src) alt='XSS Extra
```


In the following image you can see the embedded code that executes the payload in the main web.
![image](https://github.com/sromanhu/ConcreteCMS-Stored-XSS---SEO-Extra/assets/87250597/780dbb1f-7fe3-4e06-be79-788b85b421e1)



</br>

### Additional Information:
https://www.concretecms.com/

https://owasp.org/Top10/es/A03_2021-Injection/
文件快照

[4.0K] /data/pocs/9c300d4cf790fb9091169af11e2b06655503e531 └── [1.1K] README.md 0 directories, 1 file
神龙机器人已为您缓存
备注
    1. 建议优先通过来源进行访问。
    2. 本地 POC 快照面向订阅用户开放;当原始来源失效或无法访问时,本地镜像作为订阅权益的一部分提供。
    3. 持续抓取、验证、维护这份 POC 档案需要不少投入,因此本地快照已纳入付费订阅。您的订阅是让这份资料能继续走下去的关键,由衷感谢。 查看订阅方案 →