Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2021-43032 PoC — XenForo 跨站脚本漏洞

Source
Associated Vulnerability
Title:XenForo 跨站脚本漏洞 (CVE-2021-43032)
Description:XenForo是开源的用PHP编程语言编写的商业Internet论坛软件包。 XenForo 2.2.7之前版本存在跨站脚本漏洞,该漏洞源于软件管理页面中的Advertising函数在创建新的Advertising时缺少对于用户输入内容的过滤与转义。攻击者可以利用该漏洞在HTML文档的主体中保存一个XSS有效负载。这个有效负载将在客户端全局执行。
Description
Post authenticated stored-xss in XenForo versions ≤ 2.2.7
Readme
# CVE-2021-43032
In XenForo ≤ 2.2.7, a threat actor with access to the admin panel can save cross-site scripting payloads in any function within the application that accepts HTML code. A payload placed within the 'Advertising' functionality will execute globally on the client side, allowing for multiple exploitation scenarios, whereas other payloads will execute on the clientside depending on where it was stored.

Credits: John Jackson @johnjhacking & Jackson Henry @JacksonHHax
# Steps to Replicate
1. Login to the admin panel located at /admin.php
![Admin Panel](https://github.com/SakuraSamuraii/CVE-2021-43032/blob/main/1.png?raw=true)
2. Create a new advertisement and store the payload <script>alert(1)</script> within the HTML body.
![Advertisement PoC](https://github.com/SakuraSamuraii/CVE-2021-43032/blob/main/2.png?raw=true)
3. Navigate to the clientside and you'll see the alert popup universally across the application.
![Alert 1](https://github.com/SakuraSamuraii/CVE-2021-43032/blob/main/3.png?raw=true)
4. You can store scripts that will execute in varying parts of the application. As another example, here is the process of storing malicious script in the node functionality.
![Node PoC](https://github.com/SakuraSamuraii/CVE-2021-43032/blob/main/4.png?raw=true)
5. Going to the clientside and navigating to the particular node results in execution.
![Alert 2](https://github.com/SakuraSamuraii/CVE-2021-43032/blob/main/5.png?raw=true)
# Impact
The biggest risk with this vulnerability would be an ill-intended user executing covert actions embeded in extensive HTML pages, such as mining cryptocurrency or exfiltrating data. This could be a user with pre-existing access to the application, or a threat actor that obtains credentials via account takeover or social engineering methodology. 
File Snapshot

[4.0K] /data/pocs/11509d1c3b16e5c25e12a8ae7755bd6841a16bc0 ├── [ 28K] 1.png ├── [ 72K] 2.png ├── [106K] 3.png ├── [ 89K] 4.png ├── [ 68K] 5.png └── [1.8K] README.md 0 directories, 6 files
Shenlong Bot has cached this for you
Remarks
    1. It is advised to access via the original source first.
    2. If the original source is unavailable, please email f.jinxu#gmail.com for a local snapshot (replace # with @).
    3. Shenlong has snapshotted the POC code for you. To support long-term maintenance, please consider donating. Thank you for your support.