关联漏洞
描述
SherlockIM ChatBot XSS
介绍
# CVE-2021-29267
SherlockIM ChatBot XSS
[Suggested description]: SherlockIM is vulnerable to Persistent XSS.
[Additional Information]: SherlockIM - Platform for manage all kind of conversations with customers.
[Vulnerability Type]: Cross Site Scripting (XSS)
[Vendor of Product]: https://sherlockim.ae
A letter was sent to the vendor about the vulnerability.
[Attack Type]: Remote
[Attack Vectors]: Attacker uploads malicious HTML file via chat bot. Malicious file is loaded in customer subdomain (every customer has unique subdomain in the sherlockcrm domain). Malicious code in uploaded file successfully executed in "customer.sherlockcrm.ru". Link to uploaded file leaks via chat bot and has the following format: https://customer.sherlockcrm.ru/api/Files/Attachment/unique_ID.html. Link is valid until manual delete. Attacker can attack help desk employees.
[Discovered]: Alexander Semenenko
[Reference]: https://sherlockim.ae
[Proof of Concept]:

文件快照
[4.0K] /data/pocs/00f83eff038d95beff3eb6f36882fd942d3220bf
├── [1.0K] README.md
└── [ 79K] Successful execution of code.png
0 directories, 2 files
备注
1. 建议优先通过来源进行访问。
2. 如果因为来源失效或无法访问,请发送邮箱到 f.jinxu#gmail.com 索取本地快照(把 # 换成 @)。
3. 神龙已为您对POC代码进行快照,为了长期维护,请考虑为本地POC付费,感谢您的支持。