ConcreteCMS v.9.2.1 is affected by Arbitrary File Upload vulnerability that allows Cross-Site Scriting (XSS) Stored.# ConcreteCMS Stored XSS v.9.2.1
## Author: (Sergio)
**Description:** ConcreteCMS v9.2.1 is affected by Arbitrary File Upload vulnerability which allows Cross-Site Scriting (XSS) stored.
**Attack Vectors:** A vulnerability in "Thumbnail" file upload sanitation allows you to upload a PDF / SVG /HTML file with hidden alert Cross-Site scripting (XSS).
---
### POC:
When logging into the panel, we will go to the "Settings - Tags - Thumbnail off Dashboard Menu.

There is the payloads:
### XSS PDF Payload:
It is an XSS payload generated with the JS2PDFInjector tool and a js payload that contains the following content:
```js
app.alert("XSS");
```
Once uploaded, if we click on the link we can see the path where they are stored:

In the following image you can see the embedded code that executes the payload in the main web.

</br>
### Additional Information:
https://www.concretecms.com/
https://owasp.org/Top10/es/A03_2021-Injection/
[4.0K] /data/pocs/f95a839a5c275a6cd587378bf30625c700ef46ba
└── [1.3K] README.md
0 directories, 1 file