Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%
Get alerts for future matching vulnerabilitiesLog in to subscribe
I. Basic Information for CVE-2022-39197
Vulnerability Information

Have questions about the vulnerability? See if Shenlong's analysis helps!
View Shenlong Deep Dive ↗

Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.

Vulnerability Title
N/A
Source: NVD (National Vulnerability Database)
Vulnerability Description
An XSS (Cross Site Scripting) vulnerability was found in HelpSystems Cobalt Strike through 4.7 that allowed a remote attacker to execute HTML on the Cobalt Strike teamserver. To exploit the vulnerability, one must first inspect a Cobalt Strike payload, and then modify the username field in the payload (or create a new payload with the extracted information and then modify that username field to be malformed).
Source: NVD (National Vulnerability Database)
CVSS Information
N/A
Source: NVD (National Vulnerability Database)
Vulnerability Type
N/A
Source: NVD (National Vulnerability Database)
Vulnerability Title
HelpSystems Cobalt Strike 跨站脚本漏洞
Source: CNNVD (China National Vulnerability Database)
Vulnerability Description
HelpSystems Cobalt Strike是美国HelpSystems公司的一个渗透测试软件。 HelpSystems Cobalt Strike 4.7及之前版本存在跨站脚本漏洞,该漏洞源于XSS(跨站脚本)漏洞,允许远程攻击者在Cobalt Strike团队服务器上执行HTML。
Source: CNNVD (China National Vulnerability Database)
CVSS Information
N/A
Source: CNNVD (China National Vulnerability Database)
Vulnerability Type
N/A
Source: CNNVD (China National Vulnerability Database)
Affected Products
VendorProductAffected VersionsCPESubscribe
-n/a n/a -
II. Public POCs for CVE-2022-39197
#POC DescriptionSource LinkShenlong Link
1CVE-2022-39197https://github.com/safe3s/CVE-2022-39197POC Details
2cobaltstrike4.5版本破/解、去除checksum8特征、bypass BeaconEye、修复错误路径泄漏stage、增加totp双因子验证、修复CVE-2022-39197等https://github.com/zeoday/cobaltstrike4.5_cdf-1POC Details
3cve-2022-39197 pochttps://github.com/burpheart/cve-2022-39197POC Details
4CVE-2022-39197(CobaltStrike XSS <=4.7) POChttps://github.com/xzajyjs/CVE-2022-39197-POCPOC Details
5Cobalt Strike RCE CVE-2022-39197 https://github.com/yqcs/CSPOCPOC Details
6Nonehttps://github.com/purple-WL/Cobaltstrike-RCE-CVE-2022-39197POC Details
7cobaltstrike4.5版本破解、去除checksum8特征、bypass BeaconEye、修复错误路径泄漏stage、增加totp双因子验证、修复CVE-2022-39197等https://github.com/lovechoudoufu/about_cobaltstrike4.5_cdfPOC Details
8CVE-2022-39197 漏洞补丁. CVE-2022-39197 Vulnerability Patch. https://github.com/burpheart/CVE-2022-39197-patchPOC Details
9CVE-2022-39197https://github.com/hluwa/cobaltstrike_swing_xss2rcePOC Details
10CVE-2022-39197 bug fix patchhttps://github.com/4nth0ny1130/CVE-2022-39197-fix_patchPOC Details
11CobaltStrike <= 4.7.1 RCEhttps://github.com/its-arun/CVE-2022-39197POC Details
12CVE-2022-39197 RCE POChttps://github.com/TheCryingGame/CVE-2022-39197-RCEPOC Details
13CVE-2022-39197https://github.com/adeljck/CVE-2022-39197POC Details
14Cobalt Strike 4.4 猪猪版 去暗桩 去流量特征 beacon仿造真实API服务 修补CVE-2022-39197补丁https://github.com/xiao-zhu-zhu/pig_CS4.4POC Details
15A testing tool for CobaltStrike-RCE:CVE-2022-39197; Weblogic-RCE:CVE-2023-21839; MinIO:CVE-2023-28432https://github.com/Romanc9/Gui-poc-testPOC Details
AI-Generated POCPremium

No public POC found.

Login to generate AI POC
III. Intelligence Information for CVE-2022-39197
Please Login to view more intelligence information
IV. Related Vulnerabilities
V. Comments for CVE-2022-39197

No comments yet


Leave a comment