Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2023-44763 PoC — PortlandLabs Concrete CMS 代码问题漏洞

Source
Associated Vulnerability
Title:PortlandLabs Concrete CMS 代码问题漏洞 (CVE-2023-44763)
Description:PortlandLabs Concrete CMS是美国PortlandLabs公司的一个面向团队的开源内容管理系统。 PortlandLabs Concrete CMS v9.2.1版本存在代码问题漏洞,该漏洞源于存在任意文件上传漏洞,允许跨站脚本(XSS)攻击。
Description
ConcreteCMS v.9.2.1 is affected by Arbitrary File Upload vulnerability that allows Cross-Site Scriting (XSS) Stored.
Readme
# ConcreteCMS Stored XSS v.9.2.1

## Author: (Sergio)

**Description:** ConcreteCMS v9.2.1 is affected by Arbitrary File Upload vulnerability which allows Cross-Site Scriting (XSS) stored.

**Attack Vectors:** A vulnerability in "Thumbnail" file upload sanitation allows you to upload a PDF / SVG /HTML file with hidden alert Cross-Site scripting (XSS).

---

### POC:


When logging into the panel, we will go to the "Settings - Tags - Thumbnail off Dashboard Menu.

![image](https://github.com/sromanhu/ConcreteCMS-Arbitrary-file-upload-Thumbnail/assets/87250597/d84b46ee-afdf-4525-93a7-1a8b18640ca8)


There is the payloads:

### XSS PDF Payload:

It is an XSS payload generated with the JS2PDFInjector tool and a js payload that contains the following content:

```js
app.alert("XSS");
```

Once uploaded, if we click on the link we can see the path where they are stored:

![image](https://github.com/sromanhu/ConcreteCMS-Arbitrary-file-upload-Thumbnail/assets/87250597/12f185c7-5cab-4d61-a038-d0914dc8d7b7)



In the following image you can see the embedded code that executes the payload in the main web.

![image](https://github.com/sromanhu/ConcreteCMS-Arbitrary-file-upload-Thumbnail/assets/87250597/dc0ad943-22ea-4976-95fa-e71210d878f9)


</br>

### Additional Information:
https://www.concretecms.com/

https://owasp.org/Top10/es/A03_2021-Injection/
File Snapshot

[4.0K] /data/pocs/f95a839a5c275a6cd587378bf30625c700ef46ba └── [1.3K] README.md 0 directories, 1 file
Shenlong Bot has cached this for you
Remarks
    1. It is advised to access via the original source first.
    2. If the original source is unavailable, please email f.jinxu#gmail.com for a local snapshot (replace # with @).
    3. Shenlong has snapshotted the POC code for you. To support long-term maintenance, please consider donating. Thank you for your support.