Skip to content

bartfroklage/CVE-2024-37383-POC

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

8 Commits
 
 
 
 
 
 
 
 

Repository files navigation

CVE-2024-37383-POC

Proof of concept for CVE-2024-37383

Introduction

This repository contains a proof of concept for the XSS vulnerability in roundcube: CVE-2024-37383.

More information about this vulnerability can be found: here

Steps

Start Roundcube

If you don't have an instance of roundcube running yet. You can use the start_roundcube.sh script to do so.

You will need docker installed.

The script is now configured to work with gmx, but you can change the variables in the script if you want to work with a different email provider. The email provider must support IMAP.

Send email with payload

Below are some sample commands you can use to send an email with the payload.

python3 exploit.py -e your.email@gmail.com -p 'your app password' -t your.roundcube.email@gmx.com

This command assumes that you use gmail for sending the email, you need an app password which you can request here.

python3 exploit.py -e your.email@emailprovider.com -p 'email.password' -t your.roundcube.email@gmx.com -sh your.smtp.host -sp 587

If you use another email provider to send the email.

Check your mail in roundcube

Check your mail in the roundcube instance. If you click the link it should trigger an alert.

Screenshot

Note

This payload still requires the user to click, if you have an idea for a payload that doesn't require a click please let me know.

X: @Gibout2f

About

Proof of concept for CVE-2024-37383

Resources

Stars

Watchers

Forks

Releases

No releases published

Packages

No packages published