Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2020-14065 PoC — IceWarp Mail Server 安全漏洞

Source
Associated Vulnerability
Title:IceWarp Mail Server 安全漏洞 (CVE-2020-14065)
Description:Icewarp IceWarp Mail Server是捷克爱思华宝(Icewarp)公司的一款邮件服务器产品。该产品支持电子邮件归档、SmartAttach附件、自动迁移等。 IceWarp Mail Server 12.3.0.1版本存在安全漏洞。远程攻击者可利用该漏洞上传文件并占用磁盘空间。
Readme
# Icewarp Email Server 12.3.0.1 unlimited_file_upload
https://nvd.nist.gov/vuln/detail/CVE-2020-14065
## Introduction :
### first step:  login to your account and then change your profile picture.

### second step: send request to intruder, and add posiotion like below.
![alt text](https://github.com/networksecure/icewarp_unlimited_file_upload/blob/master/unlimi2.PNG)

### third step: send request to intruder, and add posiotion like below.  
![alt text](https://github.com/networksecure/icewarp_unlimited_file_upload/blob/master/unlimit1.PNG)

### forth step: start attack.
result: Look at the responses, as you can see all of files has been uploaded and you can access the file. the file upload location pattern is "upload_date-folder(random number)/file(random number)" Look at below image. 
![alt text](https://github.com/networksecure/icewarp_unlimited_file_upload/blob/master/unlimited%20upload%20file-1%20-%20Copy.PNG)
File Snapshot

[4.0K] /data/pocs/45f15cabdd6c4f9e6d3eef519a14628e5c8249d4 ├── [ 929] README.md ├── [ 83K] unlimi2.PNG ├── [ 48K] unlimit1.PNG └── [114K] unlimited upload file-1 - Copy.PNG 0 directories, 4 files
Shenlong Bot has cached this for you
Remarks
    1. It is advised to access via the original source first.
    2. If the original source is unavailable, please email f.jinxu#gmail.com for a local snapshot (replace # with @).
    3. Shenlong has snapshotted the POC code for you. To support long-term maintenance, please consider donating. Thank you for your support.