PoC for Stored XSS (CVE-2023-43770) Vulnerability# CVE-2023-43770-PoC
PoC for Stored XSS (CVE-2023-43770) Vulnerability
# Description
Roundcube before 1.4.14, 1.5.x before 1.5.4, and 1.6.x before 1.6.3 allows XSS via text/plain e-mail messages with crafted links because of program/lib/Roundcube/rcube_string_replacer.php behavior.
# Attack Chain
Crafted Email -> Victim receives & opens the email -> javascript execution (Stored)
# PoC Video:
https://github.com/knight0x07/CVE-2023-43770-PoC/assets/60843949/470ec461-2e0b-4cfb-a680-2d0b83eefe8b
- YouTube Link: https://youtu.be/dxGtIIoEaIc?si=Ezcp_Li4k6mqyDS5
# References
- https://nvd.nist.gov/vuln/detail/CVE-2023-43770
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-43770
- https://www.cvedetails.com/cve/CVE-2023-43770/
- https://github.com/roundcube/roundcubemail/commit/e92ec206a886461245e1672d8530cc93c618a49b
**Ps. my first CVE =P**
[4.0K] /data/pocs/50647989e12bb03e2f37075fc42cc5a3e67ec531
└── [ 864] README.md
0 directories, 1 file