关联漏洞
描述
About RiteCMS 3.0 is affected by a Multiple Cross-Site Scripting (XSS) vulnerability that allows attackers to execute arbitrary code via a crafted payload to the Global Content Blocks in the Administration Menu
介绍
# Rite CMS v3.0 Multiple Stored XSS
## Author: (Sergio)
**Description:** Rite CMS 3.0 is affected by a Cross-Site scripting (XSS) stored vulnerability that allows attackers to execute arbitrary code via a crafted payload in to the Global Content Blocks in the Administration Menu.
**Attack Vectors:** AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:L
---
### POC:
When logging into the panel, we will go to the "Administration - Global Content Blocks - Home" .
We edit the body configuration where we add the XSS payloads.

### XSS Payload:
```js
'"><svg/onload=alert('document.domain')>
```
And when we save it, we will see that the XSS pop-up appears

</br>
文件快照
[4.0K] /data/pocs/46aaa9e86ebf8c9648aa4738d630f5216407bfa6
└── [ 939] README.md
0 directories, 1 file
备注
1. 建议优先通过来源进行访问。
2. 如果因为来源失效或无法访问,请发送邮箱到 f.jinxu#gmail.com 索取本地快照(把 # 换成 @)。
3. 神龙已为您对POC代码进行快照,为了长期维护,请考虑为本地POC付费,感谢您的支持。