6.1
CVSSv3

CVE-2022-39197

Published: 22/09/2022 Updated: 22/09/2022
CVSS v3 Base Score: 6.1 | Impact Score: 2.7 | Exploitability Score: 2.8

Vulnerability Summary

An XSS (Cross Site Scripting) vulnerability was found in HelpSystems Cobalt Strike up to and including 4.7 that allowed a remote malicious user to execute HTML on the Cobalt Strike teamserver. To exploit the vulnerability, one must first inspect a Cobalt Strike payload, and then modify the username field in the payload (or create a new payload with the extracted information and then modify that username field to be malformed).

Most Upvoted Vulmon Research Post

There is no Researcher post for this vulnerability
Would you like to share something about it? Sign up now to share your knowledge with the community.

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

helpsystems cobalt strike

Github Repositories

CVE-2022-39197 RCE POC Usage Prepare Payload Edit Line 19 with your payload in EvilJar/src/main/java/Exploitjava Build using jar mvn clean compile assembly:single Move EvilJar-10-jar-with-dependenciesjar from EvilJar/target/ to serve/ folder Edit serve\evilsvg replace [attacker] Serve using python3 -m httpserver 8080 Execute Exploit python3 cve-2022-39197py beacone

CobaltStrike-[Cat]-45-兔年快乐 Ps:猫猫Cs:基于CobaltStrike45二开完成 (原dogcs44二开功能基本都有) 自定义属于你自己的CobaltStrike,方便一些不会二开的朋友使用~ By: T00lscom 相关配置 Java版本:11 运行前请先配置CatClientproperties 客户端 右边下载的自带java11环境,直接运行runcatcsvbs即可(仅限windows)

about_cobaltstrike45_cdf cobaltstrike45版本破解、去除checksum8特征、bypass BeaconEye、修复错误路径泄漏stage、增加totp双因子验证、修复CVE-2022-39197等

Cobalt-Strike-45-Secondary-modification 基于CobaltStrike45二开完成 (原dogcs44二开功能基本都有)(自带破解,不需要使用csagent) 自定义属于你自己的CobaltStrike,方便一些不会二开的朋友使用~本人只测试了https上线,如有bug请在lssues中提出 By: T00lscom 相关配置 Java版本:11 运行前请先配置CatClientproperties

X 简介 X 是一款红蓝对抗快速搭建基础设施的一个平台,主要解决红蓝对抗中队员直接经常沟通frp配置,cs之类的服务地址,浪费了大量时间的痛点。 文件目录功能 frp模块 cs服务开启(打了xss补丁,githubcom/burpheart/CVE-2022-39197-patch) ldap服务 开发记录 2022921 整体架构设计,

CVE-2022-39197 An XSS (Cross Site Scripting) vulnerability was found in HelpSystems Cobalt Strike through 47 that allowed a remote attacker to execute HTML on the Cobalt Strike teamserver To exploit the vulnerability, one must first inspect a Cobalt Strike payload, and then modify the username field in the payload (or create a new payload with the extracted information and th

CVE-2022-39197-POC Vulnerabilidade Intro De acordo com Update Log da última versão 471 lançada oficialmente pela CobaltStrike em 20 de setembro, a versão teamserver(<=47) possui vulnerabilidade XSS, o que pode causar RCE Fomos contatados por um pesquisador independente chamado "Beichendream" para nos informar sobre uma vulnerab

SharkOneCS 版本 bata00 测试版 一些说明 基于CobaltStrike45二开完成 SharkOne的主要功能是将beacon代码可视化,其实是为了方便自己也方便其他做这方面的二次开发 teamserver验证标识是将48879改成了其他标志并且验证错误会返回其他内容并记录ip 其他的一些beacon改了一些零零散散的功能,后面版

coablt_strike_45 可以利用這個版本本做CVE-2022-39197 RCE POC,以及其他的漏洞測試,請在解壓前關閉防禦病毒軟件,當然會被查殺

CS_Agent_INA CS 45 Java Agent INA 为了修复XSS RCE的同时提供其他功能聚合而成的cs agent 1、支持XSS RCE修复、汉化、agent调试限制绕过及其他功能 2、理论支持CS4X版本,Java8|java11下CS45原版 已进行运行验证测试 声明 1、非完全原创代码, 整合于CSAgent、Attack2DefenseAgent、C

CVE-2022-39197-POC CVE-2022-39197(CobaltStrike XSS <=47) POC

CVE-2022-39197 patch CVE-2022-39197 Cobalt Strike XSS 漏洞的一个临时补丁 通过 hook javaxswingplafbasicBasicHTML的isHTMLString方法来禁用swing的html支持 PS: 部分依赖html的页面无法正常渲染(例如 关于页面) 使用方法 将 patchjar 放入cobaltstrike启动目录下 在cobaltstrike启动参数中加入javaagent 启用补丁 -javaagent:patch

cve-2022-39197

CVE-2022-39197-fix_patch repair

CVE-2022-39197 RCE POC Reference Links mpweixinqqcom/s/Eb0pQ-1ebLSKPUFC7zS6dg — There’s a great in depth analysis of this vulnerability wwwagarrifr/blog/archives/2012/05/11/svg_files_and_java_code_execution/indexhtml

coabltstrike45- 可以利用這版本做CVE-2022-39197 RCE POC,以及其他的漏洞測試,請在解壓前關閉防毒軟體,不然會被查殺

Cobaltstrike RCE 漏洞CVE-2022-39197复现 漏洞简述 该漏洞存在于Cobalt Strike的Beacon软件中,可能允许攻击者在Beacon配置中设置格式错误的用户名,触发XSS,从而导致在CS服务端上造成远程代码执行。 截图: 获取NTLMv2-SSP Hash,前提是Cobalt Strike在Windows运行 参考: wwwfreebufcom/vuls/345522html http

CVE-2022-39197 CVE-2022-39197 "ID": "CVE-2022-39197", "STATE": "RESERVED"

DogCs44 44修改版 说明 这段时间开始有人说dogcs有后门了,我寻思jar包不就放旁边吗,自己反编译和原版对比看啊。把我整无语,怕有后门就别用啊 ps:没有的时候各种求大佬给一下,等有了,运行不起来,被反制了或者掉线就说有后门 后续 所以决定不再更新dogcs了,以后也不放二开的出来

cobaltstrike RCE CVE-2022-39197 修改url参数为http监听的地址+端口再修改img的url参数,运行即可 go build -ldflags "-s -w"

0x01 概述 本项目包含CobaltStrike密码爆破、伪造上线以及DDos功能。其中伪造上线支持常见魔改版CS。 This project includes CobaltStrike password blasting, fake online and DDos functions Among them, fake online supports common secondary development version CS 0x02 环境准备 pip3 install netstruct pip3 install pefile

CS_Agent_INA CS 45 Java Agent INA 理论支持CS4X版本 更新记录: cs_agent_002 0、各功能理论完全分离、可单独进行开启关闭。 1、支持CS45 crack_auth 【配置needcrack_auth 可选 Y/N】 2、支持CS45 原版汉化 【配置needtranslation 可选 Y/N】 3、支持CS45 XSS RCE修复 【配置needfix_xss_rce 可选 Y/N】 4、支持CS45 ja

Orbital 修改内容 去除版权验证,去除暗桩 修改修改配置信息的异或密钥 修改BeaconEye特征的memset初始值 删除服务端响应返回字符串 修改默认配置文件名 修复foreign派生错误的bug 修改控制端与服务端间socket的magic值 修改beacon中特征字符串 修改http/https/dns的Beacon中Sleep Mask功能 修改Sleep Mask的

CVE-2022-3919 The Jetpack CRM WordPress plugin before 543 does not sanitise and escape its settings, allowing high privilege users such as admin to perform cross-Site Scripting attacks even when the unfiltered_html capability is disallowed authentication complexity vector not available not available not available confidentiality integrity availability not av

Counter-Strike 16 ​ 不定期更新BUG Features 分离Client与TeamServer 去除Java端与Beacon端验证暗桩(javaasist、文件完整性校验、WarterMark验证、水印) 更改checksum8以及CVE-2022-23317 更改Beacon Config结构体,使得不使用SleepMask也无法扫描出特征 修改Beacon Config的XOR KEY为不同KEY异或两次,使自动化的

TOP all Top Top Top_Codeql TOP All bugbounty pentesting CVE-2022- POC Exp Things Table of Contents 2022 year top total 30 2021 year top total 30 2020 year top total 30 2019 year top total 30 2018 year top total 30 2017 year top total 30 2016 year top total 30 2015 year top total 30 2014 year top total 30 2013 year top total 30 2022 star name url des 988 CVE-2022-0847-

Table of Contents 2023 year top total 30 2022 year top total 30 2021 year top total 30 2020 year top total 30 2019 year top total 30 2018 year top total 30 2017 year top total 30 2016 year top total 30 2015 year top total 30 2014 year top total 30 2023 star updated_at name url des 323 2023-03-23T01:27:35Z Windows_LPE_AFD_CVE-2023-21768 githubcom/chompie1337/Wi

Table of Contents 2023 year top total 30 2022 year top total 30 2021 year top total 30 2020 year top total 30 2019 year top total 30 2018 year top total 30 2017 year top total 30 2016 year top total 30 2015 year top total 30 2014 year top total 30 2023 star updated_at name url des 304 2023-03-18T21:10:14Z Windows_LPE_AFD_CVE-2023-21768 githubcom/chompie1337/Wi

Table of Contents 2023 year top total 30 2022 year top total 30 2021 year top total 30 2020 year top total 30 2019 year top total 30 2018 year top total 30 2017 year top total 30 2016 year top total 30 2015 year top total 30 2014 year top total 30 2013 year top total 30 2012 year top total 30 2011 year top total 30 2010 year top total 30 2009 year top total 30 2008 year top to

PoC in GitHub 2022 CVE-2022-0185 (2022-02-11) A heap-based buffer overflow flaw was found in the way the legacy_parse_param function in the Filesystem Context functionality of the Linux kernel verified the supplied parameters length An unprivileged (in case of unprivileged user namespaces enabled, otherwise needs namespaced CAP_SYS_ADMIN privilege) local user able to open a f

PoC in GitHub 2022 CVE-2022-0185 (2022-02-11) A heap-based buffer overflow flaw was found in the way the legacy_parse_param function in the Filesystem Context functionality of the Linux kernel verified the supplied parameters length An unprivileged (in case of unprivileged user namespaces enabled, otherwise needs namespaced CAP_SYS_ADMIN privilege) local user able to open a f

Github CVE Monitor Automatic monitor github cve using Github Actions Last generated : 2023-08-10 02:27:54320425 CVE Name Description Date CVE-2023-51504 Sybelle03/CVE-2023-51504 This is a dockerized reproduction of the MotoCMS SQL injection (cf exploit db) 2023-06-08T07:37:08Z CVE-2023-38814 actuator/BSIDES-Security-Rochester-2023 Hardware Hacking: A Brief Primer on