Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2023-44770 PoC — Zenario CMS 跨站脚本漏洞

Source
Associated Vulnerability
Title:Zenario CMS 跨站脚本漏洞 (CVE-2023-44770)
Description:Zenario CMS是Zenario开源的一个应用软件。提供一个基于Web的内容管理系统。 Zenario CMS v.9.4.59197版本存在跨站脚本漏洞,该漏洞源于存在跨站脚本(XSS)漏洞。攻击者可利用该漏洞过设计Organizer-Spare脚本执行任意代码。
Description
Zenariocms 9.4.59197 is affected by a Cross-Site Scripting (XSS) vulnerability that allows attackers to execute arbitrary code via a crafted payload to the Spare alias from organizer.
Readme
# ZenarioCMS Reflected XSS v.9.4.59197

## Author: (Sergio)

**Description:** Cross Site Scripting vulnerability in ZenarioCMS v.9.4.59197 allows a local attacker to execute arbitrary code via a crafted script to the Organizer - Spare alias.

**Attack Vectors:** Scripting a vulnerability in the sanitization of the entry in the Spare alias. allows injecting JavaScript code that will be executed when the user accesses the web page.

---

### POC:


When logging into the panel, we will go to the "Organizer - Spare alias off the Organizer Menu.


We click on Create a spare alias and add the following payload to the Spare alias field:



### XSS Payload:

```js
"' onfocus="alert(1)" autofocus="
```



In the following image you can see the XSS pop-up when the payload is executed:


![image](https://github.com/sromanhu/ZenarioCMS--Reflected-XSS---Organizer-Alias/assets/87250597/f20c7a1e-27c2-440e-bade-7da83968f7ca)




</br>

### Additional Information:
https://zenar.io/

https://owasp.org/Top10/es/A03_2021-Injection/
File Snapshot

[4.0K] /data/pocs/47314653930f73c1c9750f34a829b8267e3a6064 └── [1.0K] README.md 0 directories, 1 file
Shenlong Bot has cached this for you
Remarks
    1. It is advised to access via the original source first.
    2. If the original source is unavailable, please email f.jinxu#gmail.com for a local snapshot (replace # with @).
    3. Shenlong has snapshotted the POC code for you. To support long-term maintenance, please consider donating. Thank you for your support.