SPIP 4.3.3 — Malicious File Upload (XSS in PDF) (CVE-2024–53619)

GrimTheRipper
3 min readNov 13, 2024

Description:

We have identified a vulnerability that allows an authenticated admin account to upload a PDF file containing malicious javascript code (Stored Cross-Site Scripting) into the target system. If the file is accessed through the website, it could lead to a Cross-Site Scripting (XSS) attack or execute arbitrary code via a crafted javascript to the target.

Payload:

<script>alert(/Grim The Ripper Team by SOSECURE Thailand/)</script>

Affected Component :

http://IP/ecrire/?exec=documents

Proof of Concept:

First, login to the target application.

http://IP/spip.php?page=login

We login to the target application with admin privileges.

Begin by clicking on the “Edit” tab and click on the “Documents”

Clicking on “Add an image or a document”.

Select the file containing the XSS script that you want to upload.

Click “Open Link in New Tab” in google chrome.

Then clicking change.

Clicking published online and change.

Clicking Add a document.

Clicking media library

Clicking Browse…

Select PDF.

Then go to

http://IP/ecrire/?exec=article&id_article=1

Clicking Open link in new tap.

The XSS payload will run immediately.

Author:

Grim The Ripper Team by SOSECURE Thailand.

Sign up to discover human stories that deepen your understanding of the world.

Free

Distraction-free reading. No ads.

Organize your knowledge with lists and highlights.

Tell your story. Find your audience.

Membership

Read member-only stories

Support writers you read most

Earn money for your writing

Listen to audio narrations

Read offline with the Medium app

GrimTheRipper
GrimTheRipper

Written by GrimTheRipper

You get the best out of others when you give the best of yourself

No responses yet

Write a response