# N/A
## 漏洞概述
Roundcube 通过 1.5.7 和 1.6.x 至 1.6.7 版本中存在跨站脚本(XSS)漏洞,使远程攻击者能够通过特制的电子邮件消息窃取并发送受害者的邮件。
## 影响版本
- Roundcube 1.5.7 及其之前版本
- Roundcube 1.6.x 至 1.6.7 版本
## 漏洞细节
该漏洞源于 `program/actions/mail/show.php` 文件中的 `message_body()` 函数出现的去污染(Desanitization)问题。利用这一问题,攻击者可以通过精心设计的电子邮件消息执行跨站脚本攻击,从而窃取并发送受害者的邮件。
## 影响
远程攻击者可以利用此漏洞通过特制的电子邮件消息窃取并发送受害者的邮件。
                                        
                                    
                                | # | POC 描述 | 源链接 | 神龙链接 | 
|---|---|---|---|
| 1 | This script exploits a stored XSS vulnerability (CVE-2024-42009) in Roundcube Webmail version 1.6.7. It injects a malicious payload into the webmail system, which, when triggered, exfiltrates email content from the victim’s inbox. | https://github.com/0xbassiouny1337/CVE-2024-42009 | POC详情 | 
| 2 | This Proof of Concept (PoC) demonstrates an exploit for CVE-2024-42009, leveraging a cross-site scripting (XSS) vulnerability to extract emails from a target webmail application. The attack injects a malicious payload that exfiltrates email content to an attacker-controlled listener. | https://github.com/Bhanunamikaze/CVE-2024-42009 | POC详情 | 
| 3 | CVE-2024-42009 Proof of Concept | https://github.com/DaniTheHack3r/CVE-2024-42009-PoC | POC详情 | 
| 4 | None | https://github.com/Shubhankargupta691/CVE-2024-42009 | POC详情 | 
| 5 | A Cross-Site Scripting vulnerability in Roundcube through 1.5.7 and 1.6.x through 1.6.7 allows a remote attacker to steal and send emails of a victim via a crafted e-mail message that abuses a Desanitization issue in message_body() in program/actions/mail/show.php. | https://github.com/projectdiscovery/nuclei-templates/blob/main/http/cves/2024/CVE-2024-42009.yaml | POC详情 | 
暂无评论