关联漏洞
标题:XenForo 跨站脚本漏洞 (CVE-2021-43032)Description:XenForo是开源的用PHP编程语言编写的商业Internet论坛软件包。 XenForo 2.2.7之前版本存在跨站脚本漏洞,该漏洞源于软件管理页面中的Advertising函数在创建新的Advertising时缺少对于用户输入内容的过滤与转义。攻击者可以利用该漏洞在HTML文档的主体中保存一个XSS有效负载。这个有效负载将在客户端全局执行。
Description
Post authenticated stored-xss in XenForo versions ≤ 2.2.7
介绍
# CVE-2021-43032
In XenForo ≤ 2.2.7, a threat actor with access to the admin panel can save cross-site scripting payloads in any function within the application that accepts HTML code. A payload placed within the 'Advertising' functionality will execute globally on the client side, allowing for multiple exploitation scenarios, whereas other payloads will execute on the clientside depending on where it was stored.
Credits: John Jackson @johnjhacking & Jackson Henry @JacksonHHax
# Steps to Replicate
1. Login to the admin panel located at /admin.php

2. Create a new advertisement and store the payload <script>alert(1)</script> within the HTML body.

3. Navigate to the clientside and you'll see the alert popup universally across the application.

4. You can store scripts that will execute in varying parts of the application. As another example, here is the process of storing malicious script in the node functionality.

5. Going to the clientside and navigating to the particular node results in execution.

# Impact
The biggest risk with this vulnerability would be an ill-intended user executing covert actions embeded in extensive HTML pages, such as mining cryptocurrency or exfiltrating data. This could be a user with pre-existing access to the application, or a threat actor that obtains credentials via account takeover or social engineering methodology.
文件快照
[4.0K] /data/pocs/11509d1c3b16e5c25e12a8ae7755bd6841a16bc0
├── [ 28K] 1.png
├── [ 72K] 2.png
├── [106K] 3.png
├── [ 89K] 4.png
├── [ 68K] 5.png
└── [1.8K] README.md
0 directories, 6 files
备注
1. 建议优先通过来源进行访问。
2. 如果因为来源失效或无法访问,请发送邮件到 f.jinxu#gmail.com 索取本地快照(把 # 换成 @)。
3. 神龙已为您对 POC 代码进行快照,为了长期维护,请考虑为本地 POC 付费/捐赠,感谢您的支持。