Headline
CVE-2023-43359: GitHub - sromanhu/CVE-2023-43359-CMSmadesimple-Stored-XSS----Content-Manager: Cross Site Scripting vulnerability in CMSmadesimple v.2.2.18 allows a local attacker to execute arbitrary code via a craft
Cross Site Scripting vulnerability in CMSmadesimple v.2.2.18 allows a local attacker to execute arbitrary code via a crafted script to the Page Specific Metadata and Smarty data parameters in the Content Manager Menu component.
CMSmadesimple Stored XSS v2.2.18****Author: (Sergio)
Description: Multiple cross-site scripting (XSS) vulnerabilites in CMSmadesimple v.2.2.18 allows a local attacker to execute arbitrary code via a crafted script to the Page Specific Metadata and Smarty data in the Content Manager Menu.
Attack Vectors: Scripting A vulnerability in the sanitization of the entry in the “Content Manager Menu” allows injecting JavaScript code that will be executed when the user accesses the web page.
POC:
When logging into the panel, we will go to the “Content- Content Manager Menu.” section off General Menu.
We edit that Content Manager Menu that we have created and see that we can inject arbitrary Javascript code in the Page Specific Metadata and Smarty data
XSS Payload:
<object data=javascript:\u0061le%72t(‘Metadata’)>
<object data=javascript:\u0061le%72t(‘Smarty’)>
In the following image you can see the embedded code that executes the payload in the main web.
Additional Information:
http://www.cmsmadesimple.org/
https://owasp.org/Top10/es/A03_2021-Injection/