Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2024-39031 PoC — Silverpeas 安全漏洞

Source
Associated Vulnerability
Title:Silverpeas 安全漏洞 (CVE-2024-39031)
Description:Silverpeas是一套开源的业务协作平台。该平台包括项目管理、博客、论坛和文档管理等应用程序。 Silverpeas 6.3.5及之前版本存在安全漏洞,该漏洞源于容易受到存储型跨站脚本攻击。
Description
Stored Cross-Side Scripting (XSS) leads to privilege escalation in SilverPeas social-networking portal
Readme
# CVE-2024-39031 : Silverpeas Core Stored XSS in in Mes agendas
## Information
<b>Description:</b> Inside of mes agendas a user can create new even and add it to his calendar, the user can also add other users to the event from the same domain, including administrator.
A normal user can create an event with XSS payload inside “Titre” and “Description” parameters and add the administrator or any user to the even, when the other user (victim) visits his own profile (even without clicking on the event) the payload will be executed on the victim side.

<b>Versions Affected:</b> <= 6.3.5

<b>Version Fixed:</b> 6.3.5

<b>Researcher:</b> Tonee Marqus with Phronesis Security (https://www.phronesissecurity.com/)

<b>Applied Fix:</b> https://github.com/Silverpeas/Silverpeas-Core/pull/1346

## Proof-of-Concept

### Step 1

login as an any user and create a new event (agenda) in the mes agendas.
Inside the “Titre” and “Description” put the following XSS payloads: 

```<script>alert("XSS-Titre")</script>```

And 

```<script>alert("XSS-Description")</script>```

![image](https://github.com/toneemarqus/CVE-2024-39031/assets/85018947/9585a5b2-9aea-417e-91f5-5f210f955044)

### Step 2
Add another user as a participant, for example, here an administrator was added.
![image](https://github.com/toneemarqus/CVE-2024-39031/assets/85018947/be19e3b7-ad7d-4c80-87b7-313e941ad2b4)
![image](https://github.com/toneemarqus/CVE-2024-39031/assets/85018947/c040277f-4745-4865-bb00-b2d8b1106f61)
Save the event:
![image](https://github.com/toneemarqus/CVE-2024-39031/assets/85018947/ff16e47d-a4e2-4c81-a0c0-d50e2f61a64a)

### Step 3
Login to the administrator account and click on the administrator button in the top left to enter administrator profile, once you click, the XSS alert for “Titre” will pop up.
![image](https://github.com/toneemarqus/CVE-2024-39031/assets/85018947/c5ddcc2a-ccab-4700-941e-ff5cc8ab36b8)
If you click OK, the other XSS payload will also pop up for “description”
![image](https://github.com/toneemarqus/CVE-2024-39031/assets/85018947/27d3de65-3b2b-4fc8-be1f-a286520e59bc)

Additionally, the XSS payload can be triggered in many other places, for example when we click on the event from the calendar:
![image](https://github.com/toneemarqus/CVE-2024-39031/assets/85018947/833a0c7a-92e3-46ee-977a-4fd179965b40)
Or from Mon profile → Mur
![image](https://github.com/toneemarqus/CVE-2024-39031/assets/85018947/9e6e56e5-af32-41e1-9d0d-2c3fddf2a402)
Finally, from Fil d'informations:
![image](https://github.com/toneemarqus/CVE-2024-39031/assets/85018947/87dc13c7-0ac2-4b7f-93ae-bc213530e3eb)
File Snapshot

[4.0K] /data/pocs/1695516ec5aed225b5edea263202662a257d992c └── [2.6K] README.md 0 directories, 1 file
Shenlong Bot has cached this for you
Remarks
    1. It is advised to access via the original source first.
    2. If the original source is unavailable, please email f.jinxu#gmail.com for a local snapshot (replace # with @).
    3. Shenlong has snapshotted the POC code for you. To support long-term maintenance, please consider donating. Thank you for your support.