PoC for Stored XSS (CVE-2023-43770) Vulnerability
Roundcube before 1.4.14, 1.5.x before 1.5.4, and 1.6.x before 1.6.3 allows XSS via text/plain e-mail messages with crafted links because of program/lib/Roundcube/rcube_string_replacer.php behavior.
Crafted Email -> Victim receives & opens the email -> javascript execution (Stored)
cve-2023-43770-poc.mp4
- YouTube Link: https://youtu.be/dxGtIIoEaIc?si=Ezcp_Li4k6mqyDS5
- https://nvd.nist.gov/vuln/detail/CVE-2023-43770
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-43770
- https://www.cvedetails.com/cve/CVE-2023-43770/
- https://github.com/roundcube/roundcubemail/commit/e92ec206a886461245e1672d8530cc93c618a49b
Ps. my first CVE =P