关联漏洞
描述
CVE-2023-4460
介绍
# Details
Title: Authenticated Reflected Cross-Site Scripting in <b>"Uploading SVG, WEBP and ICO files"</b> Plugin for WordPress CMS</br>
Date: 2023-08-10</br>
Author: Danilo Albuquerque</br>
Vendor Homepage: https://wordpress.org</br>
Software Link: https://wordpress.org/download</br>
Version: WordPress 6.3</br>
Plugin's Name and Version: Uploading SVG, WEBP and ICO files 1.2.1</br>
Tested on: Brave (Version 1.50.119 Chromium: 112.0.5615.121 (Official Version) 64 bits)</br>
# PoC for Reflected XSS vulnerability in Uploading SVG, WEBP and ICO files 1.2.1
1. Install the plugin;
2. Create a SVG file with the malicious payload within it;
3. Go to the "Media" page and upload the SVG file; and then
4. Access the file through URL.
When you do all that and update the current page, it will bring you the alert pop-up with the message in it.
## Screenshots below
1. No plugin PoC:

2. When there is no plugin the SVG file uploading does not work:

3. The plugin's version in this day:

4. The plugin is now installed and activated:

5. Created the SVG file with the malicious payload within it:

6. SVG file's upload done:

7. Payload triggered when the file is loaded:

# Bonus section: Stored XSS
1. Changed the content of the malicious file:

3. Got the POST request in my Collaborator oastify:

文件快照
[4.0K] /data/pocs/32bba6f872c15fac406aaeefd980a5900529dbba
└── [2.5K] README.md
0 directories, 1 file
备注
1. 建议优先通过来源进行访问。
2. 如果因为来源失效或无法访问,请发送邮箱到 f.jinxu#gmail.com 索取本地快照(把 # 换成 @)。
3. 神龙已为您对POC代码进行快照,为了长期维护,请考虑为本地POC付费,感谢您的支持。