/CVE-2022-39197-POC

CVE-2022-39197(CobaltStrike XSS <=4.7) POC

Primary LanguagePython

CVE-2022-39197-POC

中文版本README_CN.md


Vulnerability Intro

According to the Update Log of the latest version 4.7.1 officially released by CobaltStrike on 20 September, teamserver version(<=4.7) has XSS vulnerability, which can cause RCE.

We were contacted by an independent researcher named "Beichendream" to inform us of an XSS vulnerability they found in the team's servers. This would allow an attacker to set a malformed username in the Beacon configuration, allowing them to execute code RCE remotely.


POC Intro

At present, this POC can only implement teamserver bomb pictures. The analysis of beacon still requires third-party tools (such as CobaltStrikeParser, etc.), but will be integrated in later versions


Usage

For details, please turn to my Chinese Blog

image-20220923205736931

Use CobaltStrikeParser to analyse the beacon.

python3 parse_beacon_config.py beacon.exe --json

Concatenate Port, C2Server and HttpPostUri to get C2Server url, put the 'Public Key' into a txt file.

pip3 install -r requirements.txt
python3 cve-2022-39197-poc.py -i http://172.16.12.2:3000/logo.png -u http://172.16.12.13:8080/visit.js/submit.php -k key.txt

image-20220923210117698


Reference code

https://github.com/Sentinel-One/CobaltStrikeParser https://github.com/burpheart/CS_mock