关联漏洞
描述
Proof of concept for CVE-2024-37383
介绍
# CVE-2024-37383-POC
Proof of concept for CVE-2024-37383
## Introduction
This repository contains a proof of concept for the XSS vulnerability in roundcube: CVE-2024-37383.
More information about this vulnerability can be found: [here](https://global.ptsecurity.com/analytics/pt-esc-threat-intelligence/fake-attachment-roundcube-mail-server-attacks-exploit-cve-2024-37383-vulnerability)
## Steps
### Start Roundcube
If you don't have an instance of roundcube running yet. You can use the `start_roundcube.sh` script to do so.
You will need docker installed.
The script is now configured to work with [gmx](https://gmx.com), but you can change the variables in the script if you want to work with a different email provider. The email provider must support IMAP.
### Send email with payload
Below are some sample commands you can use to send an email with the payload.
```
python3 exploit.py -e your.email@gmail.com -p 'your app password' -t your.roundcube.email@gmx.com
```
_This command assumes that you use gmail for sending the email, you need an app password which you can request [here](https://myaccount.google.com/apppasswords)._
```
python3 exploit.py -e your.email@emailprovider.com -p 'email.password' -t your.roundcube.email@gmx.com -sh your.smtp.host -sp 587
```
_If you use another email provider to send the email._
### Check your mail in roundcube
Check your mail in the roundcube instance. If you click the link it should trigger an alert.

## Note
This payload still requires the user to click, if you have an idea for a payload that doesn't require a click please let me know.
X: @Gibout2f
文件快照
[4.0K] /data/pocs/a03ebcd697ddf51c9276709ad72ceac41f91e0a6
├── [1.7K] exploit.py
├── [1.6K] README.md
├── [ 85K] screenshot.png
└── [ 463] start_roudcube.sh
0 directories, 4 files
备注
1. 建议优先通过来源进行访问。
2. 如果因为来源失效或无法访问,请发送邮箱到 f.jinxu#gmail.com 索取本地快照(把 # 换成 @)。
3. 神龙已为您对POC代码进行快照,为了长期维护,请考虑为本地POC付费,感谢您的支持。