sromanhu / CVE-2023-44761_ConcreteCMS-Stored-XSS---Forms

Cross Site Scripting vulnerability in ConcreteCMS v.9.2.1 allows a local attacker to execute arbitrary code via a crafted script to the Form of the Data Objects.

Geek Repo:Geek Repo

Github PK Tool:Github PK Tool

ConcreteCMS Stored XSS v.9.2.1

Author: (Sergio)

Description: Multiple Cross Site Scripting vulnerability in ConcreteCMS v.9.2.1 allows a local attacker to execute arbitrary code via a crafted script to the Forms of the Data objects.

Attack Vectors: Scripting A vulnerability in the sanitization of the entry in the Forms of "Data Objects" allows injecting JavaScript code that will be executed when the user accesses the web page.


POC:

When logging into the panel, we will go to the "System & Settings - Express - Data Objects from section off Dashboard Menu and we select one.

image

Within the chosen Data object, we go to the Forms option:

image

We click on the "Add Form" option: image

In the details of the form we choose "Add Field Set":

image

Next, we choose the + option to add data to the form field:

image

The vulnerability works with various fields, for example with "Core Properties - Text":

image

Finally we edit the content to add the payload:

image

XSS Payload:

<><img src=1 onerror=alert('Custom')>

We add the indicated payload in the "Custom Label" field:

image

In the following image you can see the embedded code that executes the payload in the main web. image

As I have indicated, it works in different fields, such as the following:

image

image


Additional Information:

https://www.concretecms.com/

https://owasp.org/Top10/es/A03_2021-Injection/

About

Cross Site Scripting vulnerability in ConcreteCMS v.9.2.1 allows a local attacker to execute arbitrary code via a crafted script to the Form of the Data Objects.