Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2023-43341 PoC — Evolution CMS 跨站脚本漏洞

Source
Associated Vulnerability
Title:Evolution CMS 跨站脚本漏洞 (CVE-2023-43341)
Description:Evolution CMS是一套基于PHP的开源内容管理系统(CMS)。 Evolution CMS v.3.2.3版本的存在安全漏洞,该漏洞源于uid参数存在跨站脚本(XSS)漏洞。
Description
Evolution CMS 3.2.3 is affected by a Cross-Site Scripting (XSS) vulnerability that allows attackers to execute arbitrary code via a crafted payload in the installation/connection process.
Readme
# Evolution CMS Reflected XSS v3.2.3

## Author: (Sergio)

**Description:** A cross-site scripting (XSS) reflected vulnerability in the evolution v.3.2.3 installation process connection allows a local attacker to execute arbitrary web scripts via a crafted payload injected into the uid parameter.

**Attack Vectors:** A vulnerability in the sanitization of the uid parameter of the Database installation process allows JavaScript code to be injected.

---

### POC:


During the installation process we enter the XSS payload in the uid parameter and when we click on next, we will obtain the XSS pop-up.

### XSS Payload:

```js
'"><svg/onload=alert('XSS')>
```


In the following image you can see the embedded code that executes the payload in the instalaltion process.
![XSS Payloadpng](https://github.com/sromanhu/Evolution-Reflected-XSS---Installation-Connection-/assets/87250597/0d9df46e-2179-4447-b36d-59db765a0d21)



And the result will be reflected with the pop-up of the following evidence:

![XSS Resultado](https://github.com/sromanhu/Evolution-Reflected-XSS---Installation-Connection-/assets/87250597/56110716-8b0d-4682-b1d8-7100cde05c8a)




</br>

### Additional Information:

https://evo.im/

File Snapshot

[4.0K] /data/pocs/bcbcbc4e539d848dd880ad8aa0a3ebc736a959e0 └── [1.2K] README.md 0 directories, 1 file
Shenlong Bot has cached this for you
Remarks
    1. It is advised to access via the original source first.
    2. If the original source is unavailable, please email f.jinxu#gmail.com for a local snapshot (replace # with @).
    3. Shenlong has snapshotted the POC code for you. To support long-term maintenance, please consider donating. Thank you for your support.