Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2023-43343 PoC — OpenSolution Quick CMS 跨站脚本漏洞

Source
Associated Vulnerability
Title:OpenSolution Quick CMS 跨站脚本漏洞 (CVE-2023-43343)
Description:OpenSolution Quick CMS是OpenSolution组织的一个免费内容管理系统。 OpenSolution Quick CMS v.6.7版本存在安全漏洞,该漏洞源于参数Files-Description存在跨站脚本(XSS)漏洞。
Description
Quick CMS 6.7 is affected by a Cross-Site Scripting (XSS) vulnerability that allows attackers to execute arbitrary code via a crafted payload to the Files - Description in the Pages Menu.
Readme
# Quick CMS Stored XSS v6.7

## Author: (Sergio)

**Description:** Multiple Cross-Site Scripting (XSS) vulnerabilities in Quick CMS v6.7 allows a local attacker to execute arbitrary code via a crafted script to the to the Files - Description in the Pages Menu.

**Attack Vectors:** Scripting A vulnerability in the sanitization of the entry in the Description of "Pages- Files Menu" allows injecting JavaScript code that will be executed when the user accesses the web page.

---

### POC:


When logging into the panel, we will go to the "Pages - Files ." section off General Menu. 

![XSS Payload Files description](https://github.com/sromanhu/Quick-CMS-Stored-XSS---Pages-Files/assets/87250597/7d436b43-6e7d-4249-9a95-461d3df1ae3e)





We edit that Description Settings and see that we can inject arbitrary Javascript code in the Desription field.


### XSS Payload:

```js
'"><svg/onload=alert('Description')>
```


In the following image you can see the embedded code that executes the payload in the main web.
![XSS resultado Payload Files description](https://github.com/sromanhu/Quick-CMS-Stored-XSS---Pages-Files/assets/87250597/97129f36-7dc4-487d-934d-070a63da6b12)





</br>

### Additional Information:
https://opensolution.org/cms-system-quick-cms.html

https://owasp.org/Top10/es/A03_2021-Injection/
File Snapshot

[4.0K] /data/pocs/fdd95273b0cdef6ef581c5a80fdeb0fd74d85642 └── [1.3K] README.md 0 directories, 1 file
Shenlong Bot has cached this for you
Remarks
    1. It is advised to access via the original source first.
    2. If the original source is unavailable, please email f.jinxu#gmail.com for a local snapshot (replace # with @).
    3. Shenlong has snapshotted the POC code for you. To support long-term maintenance, please consider donating. Thank you for your support.