Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2023-49052 PoC — Microweber 安全漏洞

Source
Associated Vulnerability
Title:Microweber 安全漏洞 (CVE-2023-49052)
Description:Microweber是美国Microweber社区的一套可提供拖拽功能的网上商店管理系统。该系统包括添加商品、图片等模块。 Microweber v.2.0.4版本存在安全漏洞,该漏洞源于允许远程攻击者通过created forms组件中的文件上传功能使用精心设计的脚本执行任意代码。
Description
Microweber version 2.0.4 vulnerable to "Uploading Malicious Files" 
Readme
# CVE-2023-49052 - Microweber CMS v2.0.4 - Uploading Malicious Files

## Description
In version 2.0.4 of Microweber CMS where the file upload option is active in created forms, it is possible to send malicious `HTML` files, even when certain types of validations are applied in this field.

This vulnerability allows an attacker to upload files containing scripts that can lead to various malicious activities, such as stealing session cookies or login credentials, redirects, installing malware, among others.

## Fix Suggestion
Update to the latest version of Microweber.

## Steps to Reproduce:

**1)** In a Microweber CMS installation, create a page with a contact form and add the `File Upload` field.

**2)** Create a new file with the content below and save it as `poc.htm`:

```js
<svg></svg>
<html>
    <head>     
    </head>
    <body>
        <h1>Hi!</h1>
        <script>
            alert(document.cookie)
        </script>
    </body>
</html>
```

**3)** Access the form page and upload the created `poc.htm` file.
![step 3](img/1.jpg)

**4)** Now, to run the sent file, simply access `http://yoursite.com/userfiles/media/default/contact_form/poc.htm`

_(replace `https://yoursite.com` with the address of your test installation.)_

![step 4](img/2.png)

**Note**: please note that the above steps work even when there are some validation measures in the `File Upload` field such as “Image Files” and “Custom File Types” such as “jpg”.

### Reference
* [Microweber Releases v2.0.5](https://github.com/microweber/microweber/releases/tag/v2.0.5)
File Snapshot

[4.0K] /data/pocs/20cb9481adba8c4c1675f775554fcd1715220223 ├── [4.0K] img │   ├── [187K] 1.jpg │   └── [ 80K] 2.png └── [1.5K] README.md 1 directory, 3 files
Shenlong Bot has cached this for you
Remarks
    1. It is advised to access via the original source first.
    2. If the original source is unavailable, please email f.jinxu#gmail.com for a local snapshot (replace # with @).
    3. Shenlong has snapshotted the POC code for you. To support long-term maintenance, please consider donating. Thank you for your support.