RiteCMS 3.0.0 Reflected Cross Site Scripting
RiteCMS 3.0.0 存在反射型 XSS 漏洞,攻击者可通过 `main_menu/edit_section` 参数注入恶意脚本,导致凭证窃取、钓鱼或控制浏览器会话。修复建议包括输入验证、输出编码和实施 CSP 策略。 2025-8-20 19:35:16 Author: cxsecurity.com(查看原文) 阅读量:11 收藏

# Exploit Title: RiteCMS 3.0.0 – Reflected Cross-Site Scripting (XSS) # Google Dork: N/A # Date: 2024-08-12 # Exploit Author: GURJOT SINGH # Vendor Homepage: https://ritecms.com/ # Software Link: https://github.com/handylulu/RiteCMS/releases/download/V3.0.0/ritecms.v3.0.0.zip # Version: <= 3.0.0 # Tested on: Ubuntu 22.04 LTS, PHP 8.1, Apache 2.4 # CVE: CVE-2024-28623 ## Description: A reflected Cross-Site Scripting (XSS) vulnerability exists in RiteCMS v3.0.0 within the `main_menu/edit_section` parameter. An attacker can inject arbitrary JavaScript code that will execute in the context of the victim's browser session. ## Impact: - Theft of credentials or session tokens - Phishing or malicious redirection - Full control over the victim’s active browser session ## Proof of Concept (PoC): Payload: '"><svg/onload=confirm(/xsss/)> Steps: 1. Log in or navigate to the vulnerable `main_menu/edit_section` functionality. 2. Inject the above payload into the vulnerable parameter. 3. Observe the execution of the injected JavaScript. Video PoC: https://github.com/GURJOTEXPERT/ritecms/blob/main/POC.mp4 Full write-up & repository: https://github.com/GURJOTEXPERT/ritecms ## Mitigation: - Implement strict input validation and output encoding. - Enforce a Content Security Policy (CSP) to limit script execution. - Update RiteCMS to a patched version when available.

References:

https://github.com/GURJOTEXPERT/ritecms/blob/main/POC.mp4




 

Thanks for you comment!
Your message is in quarantine 48 hours.


文章来源: https://cxsecurity.com/issue/WLB-2025080018
如有侵权请联系:admin#unsafe.sh