关联漏洞
描述
e107 2.3.2 is affected by a Cross-Site Scripting (XSS) vulnerability that allows attackers to execute arbitrary code via a crafted payload to the Name field in the Manage Menu.
介绍
# e107 CMS Stored XSS v2.3.2
## Author: (Sergio)
**Description:** Cross Site Scripting (XSS) vulnerability in e017 CMS v.2.3.2 allows a local attacker to execute arbitrary code via a crafted script to the Name filed in the Manage Menu.
**Attack Vectors:** Scripting A vulnerability in the sanitization of the entry in the Name of "Manage" allows injecting JavaScript code that will be executed when the user accesses the web page.
---
### POC:
When logging into the panel, we will go to the "Manage" section off General Menu.

We edit that Site Settings that we have created and see that we can inject arbitrary Javascript code in the Name field.
### XSS Payload:
```js
<img src=1 onerror=alert("1")
```
In the following image you can see the embedded code that executes the payload in the main web.

</br>
### Additional Information:
https://e107.org/
https://owasp.org/Top10/es/A03_2021-Injection/
https://owasp.org/www-community/attacks/xss/
文件快照
[4.0K] /data/pocs/b172dd41f9979522ca38c69f0c0e6e9c14c57d86
└── [1.2K] README.md
0 directories, 1 file
备注
1. 建议优先通过来源进行访问。
2. 如果因为来源失效或无法访问,请发送邮箱到 f.jinxu#gmail.com 索取本地快照(把 # 换成 @)。
3. 神龙已为您对POC代码进行快照,为了长期维护,请考虑为本地POC付费,感谢您的支持。