IceWarp WebMail Cross-Site Scripting Vulnerability

2020.01.29
Risk: Low
Local: No
Remote: Yes
CVE: N/A
CWE: N/A

[+] Title: IceWarp WebMail Cross-Site Scripting Vulnerability [+] Date: 2020/01/27 [+] Author: Lutfu Mert Ceylan [+] Vendor Homepage: www.icewarp.com [+] Tested on: Windows 10 [+] Versions: 11.4.4.1 and before [+] Vulnerable Parameter: "color" (Get Method) [+] Vulnerable File: /webmail/ [+} Dork : inurl:/webmail/ intext:Powered by IceWarp Server # Notes: An attacker can use XSS (in color parameter IceWarp WebMail 11.4.4.1 and before)to send a malicious script to an unsuspecting Admins or users. The end admins or useras browser has no way to know that the script should not be trusted, and will execute the script. Because it thinks the script came from a trusted source, the malicious script can access any cookies, session tokens, or other sensitive information retained by the browser and used with that site. These scripts can even rewrite the content of the HTML page. Even an attacker can easily place users in social engineering through this vulnerability and create a fake field. # PoC: [+] Go to Sign-in page through this path: http://localhost/webmail/ or http://localhost:32000/webmail/ [+] Add the "color" parameter to the URL and write malicious code, Example: http://localhost/webmail/?color="><svg/onload=alert(1)> [+] When the user goes to the URL, the malicious code is executed Example Vulnerable URL: http://localhost/webmail/?color="><svg/onload=alert(1)> (Payload: "><svg/onload=alert(1)>) # Demo Pictures: [+] https://i.hizliresim.com/yGY6Zj.png


Vote for this issue:
50%
50%


 

Thanks for you vote!


 

Thanks for you comment!
Your message is in quarantine 48 hours.

Comment it here.


(*) - required fields.  
{{ x.nick }} | Date: {{ x.ux * 1000 | date:'yyyy-MM-dd' }} {{ x.ux * 1000 | date:'HH:mm' }} CET+1
{{ x.comment }}

Copyright 2024, cxsecurity.com

 

Back to Top