Share
[+] Title: IceWarp WebMail Cross-Site Scripting Vulnerability  
[+] Date: 2020/01/27  
[+] Author: Lutfu Mert Ceylan  
[+] Vendor Homepage: www.icewarp.com  
[+] Tested on: Windows 10  
[+] Versions: 11.4.4.1 and before  
[+] Vulnerable Parameter: "color" (Get Method)  
[+] Vulnerable File: /webmail/  
[+} Dork : inurl:/webmail/ intext:Powered by IceWarp Server  
  
# Notes:  
  
An attacker can use XSS (in color parameter IceWarp WebMail 11.4.4.1 and before)to send a malicious script to an unsuspecting Admins or users. The end admins or useras browser has no way to know that the script should not be trusted, and will execute the script. Because it thinks the script came from a trusted source, the malicious script can access any cookies, session tokens, or other sensitive information retained by the browser and used with that site. These scripts can even rewrite the content of the HTML page. Even an attacker can easily place users in social engineering through this vulnerability and create a fake field.  
  
# PoC:  
  
[+] Go to Sign-in page through this path: http://localhost/webmail/  
or  
http://localhost:32000/webmail/  
  
[+] Add the "color" parameter to the URL and write malicious code, Example: http://localhost/webmail/?color="><svg/onload=alert(1)>  
  
[+] When the user goes to the URL, the malicious code is executed  
  
Example Vulnerable URL: http://localhost/webmail/?color="><svg/onload=alert(1)> (Payload: "><svg/onload=alert(1)>)  
  
# Demo Pictures:  
  
[+] https://i.hizliresim.com/yGY6Zj.png