CMS Made Simple v2.2.17 – Stored Cross-Site Scripting (XSS) (Authenticated)

#Exploit Title: CMS Made Simple v2.2.17 – Stored Cross-Site Scripting (XSS) (Authenticated)

#Date: 25 June 2023

#Exploit Author: Okan Kurtulus

#Vendor Homepage: https://www.cmsmadesimple.org

#Version: 2.2.17

#Tested on: Ubuntu 18.04

#CVE: 2023-36970

#Proof of Concept:

1-) Install the system through the website and login with any user. (It is also possible to login with low authorized users.)

2-) After logging in, click “File Manager” under “Content” from the left menu.

3-) At first, I wanted to upload by adding the XSS payload to the file name, but I encountered an error. My guess is there is a control mechanism.

4-) Then I caught the normal file upload request with HTTP proxy. In the relevant request, I sent a payload to the filename parameter as follows.

1.txt<img src=x onerror=alert(1)>

5-) We see that Stored XSS is triggered when we click on the “File Manager” button under “Content” in the left menu.

Leave a Reply

Your email address will not be published. Required fields are marked *