Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2022-39197 PoC — HelpSystems Cobalt Strike 跨站脚本漏洞

Source
Associated Vulnerability
Title:HelpSystems Cobalt Strike 跨站脚本漏洞 (CVE-2022-39197)
Description:HelpSystems Cobalt Strike是美国HelpSystems公司的一个渗透测试软件。 HelpSystems Cobalt Strike 4.7及之前版本存在跨站脚本漏洞,该漏洞源于XSS(跨站脚本)漏洞,允许远程攻击者在Cobalt Strike团队服务器上执行HTML。
Description
Cobalt Strike RCE CVE-2022-39197 
Readme
# Cobalt Strike 存储型XSS RCE CVE-2022-39197

### 运行参数:

> ### -u: Cobaltstrike http监听的地址,如 http://127.0.0.1:8500
>
>### -p: Payload,如 `<html><img src=http://127.0.0.1/log.png>` 不宜过长
>

### 演示:
![!est](run.png)
![main](img.png)

### 打包命令:go build -ldflags "-s -w"

---

## QQ 群:

### [点击加入:528118163](https://jq.qq.com/?_wv=1027&k=azWZhmSy)

## 加群 / 合作 / 联系(左) | 公众号:遮天实验室(右)

<img src="https://heartsk.com/static/wx.jpg" width="200"><img src="https://github.com/yqcs/ZheTian/blob/master/images/wxgzh.jpg" width="200">
File Snapshot

[4.0K] /data/pocs/a407501fc63325525c5d02f35afda62e75041ae2 ├── [ 223] go.mod ├── [ 724] go.sum ├── [ 33K] img.png ├── [1.4K] main.go ├── [ 629] README.md ├── [ 37K] run.png └── [4.0K] utils ├── [ 17K] main.go └── [ 502] rsa.go 1 directory, 8 files
Shenlong Bot has cached this for you
Remarks
    1. It is advised to access via the original source first.
    2. If the original source is unavailable, please email f.jinxu#gmail.com for a local snapshot (replace # with @).
    3. Shenlong has snapshotted the POC code for you. To support long-term maintenance, please consider donating. Thank you for your support.