Skip to content

xzajyjs/CVE-2022-39197-POC

main
Switch branches/tags

Name already in use

A tag already exists with the provided branch name. Many Git commands accept both tag and branch names, so creating this branch may cause unexpected behavior. Are you sure you want to create this branch?
Code

Latest commit

 

Git stats

Files

Permalink
Failed to load latest commit information.
Type
Name
Latest commit message
Commit time
 
 
 
 
 
 

CVE-2022-39197-POC

中文版本README_CN.md


Vulnerability Intro

According to the Update Log of the latest version 4.7.1 officially released by CobaltStrike on 20 September, teamserver version(<=4.7) has XSS vulnerability, which can cause RCE.

We were contacted by an independent researcher named "Beichendream" to inform us of an XSS vulnerability they found in the team's servers. This would allow an attacker to set a malformed username in the Beacon configuration, allowing them to execute code RCE remotely.


POC Intro

At present, this POC can only implement teamserver bomb pictures. Integrated CobaltStrikeParser analysis tool to achieve one-stop online.


Usage

For details, please turn to my Chinese Blog

pip3 install -r requirements.txt
python3 cve-2022-39197-poc.py -i http://172.16.12.2:3000/logo.png -b beacon.exe

image-20220923210117698


Reference code

https://github.com/Sentinel-One/CobaltStrikeParser https://github.com/burpheart/CS_mock

About

CVE-2022-39197(CobaltStrike XSS <=4.7) POC

Resources

Stars

Watchers

Forks

Releases

No releases published

Packages

No packages published

Languages