CVE-2022-39197(CobaltStrike XSS <=4.7) POC# CVE-2022-39197-POC
中文版本[README_CN.md](README_CN.md)
---
## Vulnerability Intro
According to the [Update Log](https://www.cobaltstrike.com/blog/out-of-band-update-cobalt-strike-4-7-1/) of the latest version 4.7.1 officially released by CobaltStrike on 20 September, teamserver version(<=4.7) has XSS vulnerability, which can cause RCE.
> We were contacted by an independent researcher named "Beichendream" to inform us of an XSS vulnerability they found in the team's servers. This would allow an attacker to set a malformed username in the Beacon configuration, allowing them to execute code RCE remotely.
---
## POC Intro
At present, this POC can only implement teamserver bomb pictures.
Integrated `CobaltStrikeParser` analysis tool to achieve one-stop online.
---
## Usage
For details, please turn to my [Chinese Blog](https://xzajyjs.cn/2022/09/23/CVE-2022-39197/)

```
pip3 install -r requirements.txt
python3 cve-2022-39197-poc.py -i http://172.16.12.2:3000/logo.png -b beacon.exe
```

---
## Reference code
https://github.com/Sentinel-One/CobaltStrikeParser
https://github.com/burpheart/CS_mock
[4.0K] /data/pocs/37b763a001828d5bf66db2882cb8ad8d6d5ed466
├── [2.3K] beacon_utils.py
├── [2.8K] cve-2022-39197-poc.py
├── [ 25K] parse_beacon_config.py
├── [1.4K] README_CN.md
├── [1.3K] README.md
└── [ 55] requirements.txt
0 directories, 6 files