Cross Site Scripting vulnerability in ConcreteCMS v.9.2.1 allows a local attacker to execute arbitrary code via a crafted script to the Tags from Settings - Tags# ConcreteCMS Reflected XSS v.9.2.1
## Author: (Sergio)
**Description:** Cross Site Scripting vulnerability in ConcreteCMS v.9.2.1 allows a local attacker to execute arbitrary code via a crafted script to the Tags from Settings - Tags.
**Attack Vectors:** Scripting a vulnerability in the sanitization of the entry in the Tags of "Settings - Tags" allows injecting JavaScript code that will be executed when the user accesses the web page.
---
### POC:
When logging into the panel, we will go to the "Settings - Tags section off Dashboard Menu.

### XSS Payload:
```js
<img src=x:alert(alt) onerror=eval(src) alt='XSS Tags'>
```
In the following image you can see the embedded code that executes the payload in the main web.

</br>
### Additional Information:
https://www.concretecms.com/
https://owasp.org/Top10/es/A03_2021-Injection/
[4.0K] /data/pocs/b7d49f4504af36766b64f917756843ad562343a6
└── [1.1K] README.md
0 directories, 1 file