Proof of concept for CVE-2024-37383
This repository contains a proof of concept for the XSS vulnerability in roundcube: CVE-2024-37383.
More information about this vulnerability can be found: here
If you don't have an instance of roundcube running yet. You can use the start_roundcube.sh
script to do so.
You will need docker installed.
The script is now configured to work with gmx, but you can change the variables in the script if you want to work with a different email provider. The email provider must support IMAP.
Below are some sample commands you can use to send an email with the payload.
python3 exploit.py -e your.email@gmail.com -p 'your app password' -t your.roundcube.email@gmx.com
This command assumes that you use gmail for sending the email, you need an app password which you can request here.
python3 exploit.py -e your.email@emailprovider.com -p 'email.password' -t your.roundcube.email@gmx.com -sh your.smtp.host -sp 587
If you use another email provider to send the email.
Check your mail in the roundcube instance. If you click the link it should trigger an alert.
This payload still requires the user to click, if you have an idea for a payload that doesn't require a click please let me know.
X: @Gibout2f