Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2019-17625 PoC — Rambox 跨站脚本漏洞

Source
Associated Vulnerability
Title:Rambox 跨站脚本漏洞 (CVE-2019-17625)
Description:Rambox是一款开源的消息传递和电子邮件应用程序。 Rambox 0.6.9版本中存在跨站脚本漏洞。该漏洞源于WEB应用缺少对客户端数据的正确验证。攻击者可利用该漏洞执行客户端代码。
Description
Working exploit code for CVE-2019-17625
Readme
# CVE-2019-17625

There is a stored XSS vulnerability in rambox 0.6.9 due to unsantized parameters in the name field when a user is adding a service. Since rambox runs on NodeJS this allows for the use of OS commands to be injected into an `<a>` or `<img>` tag.

_Note:_ This code has only been tested on MacOS and may need to be reconfigured for other operating systems

# Exploit code

The exploit code will create a service (using discord as a base), the shell requires that the system has `mkfifo` on it. You can of course swap out the payload for whatever you want.

# PoC

![rce_rambox_poc](https://user-images.githubusercontent.com/14183473/66883875-fb30fa00-ef94-11e9-82a0-589006c453a9.gif)
File Snapshot

[4.0K] /data/pocs/1fe8150ff6c8d8b0b00655a0a0722b459c701efa ├── [ 12K] nyquil.py ├── [ 699] README.md └── [ 27] requirements.txt 0 directories, 3 files
Shenlong Bot has cached this for you
Remarks
    1. It is advised to access via the original source first.
    2. If the original source is unavailable, please email f.jinxu#gmail.com for a local snapshot (replace # with @).
    3. Shenlong has snapshotted the POC code for you. To support long-term maintenance, please consider donating. Thank you for your support.