Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2023-43872 PoC — CMS Made Simple 跨站脚本漏洞

Source
Associated Vulnerability
Title:CMS Made Simple 跨站脚本漏洞 (CVE-2023-43872)
Description:CMS Made Simple(CMSMS)是Cmsms团队的一套开源的内容管理系统(CMS)。该系统支持基于角色的权限管理系统、基于向导的安装与更新机制、智能缓存机制等。 CMS Made Simple v.2.2.18版本存在跨站脚本漏洞,该漏洞源于没有验证上传的文件。
Description
CMSmadesimple 2.2.18 is affected by File Upload - XSS vulnerability that allows attackers to upload a PDF file with a hidden XSS that when executed will launch the XSS pop-up
Readme
# CMSmadesimple File Upload - XSS v2.2.18

## Author: (Sergio)

**Description:** File upload vulnerability in CMSmadesimple v.2.2.18 allows a local attacker to upload a pdf file with hidden XSS.

**Attack Vectors:** A vulnerability in File Manager file upload sanitation allows you to upload a PDF file with hidden XSS.

---

### POC:


When logging into the panel, we will go to the "Content- File Manager." section off General Menu.

![XSS pdf file upload](https://github.com/sromanhu/CMSmadesimple-File-Upload--XSS---File-Manager/assets/87250597/8274bb28-3e8c-4118-9241-33970ca1e9f3)


We upload the PDF file with the hidden XSS and we see that we can execute it and the Reflected XSS appears.


![XSS pdf file upload resultado](https://github.com/sromanhu/CMSmadesimple-File-Upload--XSS---File-Manager/assets/87250597/d1bbaad5-96a4-4377-a514-3e271b2fc7de)





</br>

### Additional Information:
http://www.cmsmadesimple.org/

https://cheatsheetseries.owasp.org/cheatsheets/File_Upload_Cheat_Sheet.html
File Snapshot

[4.0K] /data/pocs/a2ce014cd7e5e7d9956d69f7de9fed8c269f0926 └── [1007] README.md 0 directories, 1 file
Shenlong Bot has cached this for you
Remarks
    1. It is advised to access via the original source first.
    2. If the original source is unavailable, please email f.jinxu#gmail.com for a local snapshot (replace # with @).
    3. Shenlong has snapshotted the POC code for you. To support long-term maintenance, please consider donating. Thank you for your support.