Stored Cross-Side Scripting (XSS) leads to privilege escalation in SilverPeas social-networking portal# CVE-2024-39031 : Silverpeas Core Stored XSS in in Mes agendas
## Information
<b>Description:</b> Inside of mes agendas a user can create new even and add it to his calendar, the user can also add other users to the event from the same domain, including administrator.
A normal user can create an event with XSS payload inside “Titre” and “Description” parameters and add the administrator or any user to the even, when the other user (victim) visits his own profile (even without clicking on the event) the payload will be executed on the victim side.
<b>Versions Affected:</b> <= 6.3.5
<b>Version Fixed:</b> 6.3.5
<b>Researcher:</b> Tonee Marqus with Phronesis Security (https://www.phronesissecurity.com/)
<b>Applied Fix:</b> https://github.com/Silverpeas/Silverpeas-Core/pull/1346
## Proof-of-Concept
### Step 1
login as an any user and create a new event (agenda) in the mes agendas.
Inside the “Titre” and “Description” put the following XSS payloads:
```<script>alert("XSS-Titre")</script>```
And
```<script>alert("XSS-Description")</script>```

### Step 2
Add another user as a participant, for example, here an administrator was added.


Save the event:

### Step 3
Login to the administrator account and click on the administrator button in the top left to enter administrator profile, once you click, the XSS alert for “Titre” will pop up.

If you click OK, the other XSS payload will also pop up for “description”

Additionally, the XSS payload can be triggered in many other places, for example when we click on the event from the calendar:

Or from Mon profile → Mur

Finally, from Fil d'informations:

[4.0K] /data/pocs/1695516ec5aed225b5edea263202662a257d992c
└── [2.6K] README.md
0 directories, 1 file