POC详情: a03ebcd697ddf51c9276709ad72ceac41f91e0a6

来源
关联漏洞
标题: Roundcube Webmail 安全漏洞 (CVE-2024-37383)
描述:Roundcube Webmail是一款基于浏览器的开源IMAP客户端,它支持地址薄管理、信息搜索、拼写检查等。 Roundcube Webmail 1.5.7之前版本、1.6.x版本至1.6.7之前版本存在安全漏洞,该漏洞源于允许通过 SVG 动画属性进行跨站脚本攻击。
描述
Proof of concept for CVE-2024-37383
介绍
# CVE-2024-37383-POC
Proof of concept for CVE-2024-37383

## Introduction

This repository contains a proof of concept for the XSS vulnerability in roundcube: CVE-2024-37383.

More information about this vulnerability can be found: [here](https://global.ptsecurity.com/analytics/pt-esc-threat-intelligence/fake-attachment-roundcube-mail-server-attacks-exploit-cve-2024-37383-vulnerability)

## Steps

### Start Roundcube

If you don't have an instance of roundcube running yet. You can use the `start_roundcube.sh` script to do so. 

You will need docker installed.

The script is now configured to work with [gmx](https://gmx.com), but you can change the variables in the script if you want to work with a different email provider. The email provider must support IMAP.

### Send email with payload

Below are some sample commands you can use to send an email with the payload.

```
python3 exploit.py -e your.email@gmail.com -p 'your app password' -t your.roundcube.email@gmx.com
```
_This command assumes that you use gmail for sending the email, you need an app password which you can request [here](https://myaccount.google.com/apppasswords)._

```
python3 exploit.py -e your.email@emailprovider.com -p 'email.password' -t your.roundcube.email@gmx.com -sh your.smtp.host -sp 587
```
_If you use another email provider to send the email._

### Check your mail in roundcube

Check your mail in the roundcube instance. If you click the link it should trigger an alert.

![Screenshot](screenshot.png "Screenshot")

## Note

This payload still requires the user to click, if you have an idea for a payload that doesn't require a click please let me know.

X: @Gibout2f

文件快照

[4.0K] /data/pocs/a03ebcd697ddf51c9276709ad72ceac41f91e0a6 ├── [1.7K] exploit.py ├── [1.6K] README.md ├── [ 85K] screenshot.png └── [ 463] start_roudcube.sh 0 directories, 4 files
神龙机器人已为您缓存
备注
    1. 建议优先通过来源进行访问。
    2. 如果因为来源失效或无法访问,请发送邮箱到 f.jinxu#gmail.com 索取本地快照(把 # 换成 @)。
    3. 神龙已为您对POC代码进行快照,为了长期维护,请考虑为本地POC付费,感谢您的支持。