sromanhu / CVE-2023-43360-CMSmadesimple-Stored-XSS---File-Picker-extension

Cross Site Scripting vulnerability in CMSmadesimple v.2.2.18 allows a local attacker to execute arbitrary code via a crafted script to the Top Directory in the File Picker Menu.

Geek Repo:Geek Repo

Github PK Tool:Github PK Tool

CMSmadesimple Stored XSS v2.2.18

Author: (Sergio)

Description: Cross Site Scripting vulnerability in CMSmadesimple v.2.2.18 allows a local attacker to execute arbitrary code via a crafted script to the Top Directory in the File Picker Menu.

Attack Vectors: Scripting A vulnerability in the sanitization of the entry in the Top Directory of "File Picker Menu" allows injecting JavaScript code that will be executed when the user accesses the web page.


POC:

When logging into the panel, we will go to the "File Picker extensions- Top Directory." section off General Menu.

XSS FilePicker

We edit that Top Directory Menu that we have created and see that we can inject arbitrary Javascript code in the Global Meatadata field.

XSS Payload:

""><svg/onload=alert('FilePicker')>

In the following image you can see the embedded code that executes the payload in the main web. XSS FilePicker resultado


Additional Information:

http://www.cmsmadesimple.org/

https://owasp.org/Top10/es/A03_2021-Injection/

About

Cross Site Scripting vulnerability in CMSmadesimple v.2.2.18 allows a local attacker to execute arbitrary code via a crafted script to the Top Directory in the File Picker Menu.