2024-05-25 21:48:12 +02:00
### [CVE-2022-39197](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-39197)



### Description
An XSS (Cross Site Scripting) vulnerability was found in HelpSystems Cobalt Strike through 4.7 that allowed a remote attacker to execute HTML on the Cobalt Strike teamserver. To exploit the vulnerability, one must first inspect a Cobalt Strike payload, and then modify the username field in the payload (or create a new payload with the extracted information and then modify that username field to be malformed).
### POC
#### Reference
- https://www.cobaltstrike.com/blog/out-of-band-update-cobalt-strike-4-7-1/
- https://www.cobaltstrike.com/blog/tag/release/
#### Github
- https://github.com/20142995/sectool
- https://github.com/4nth0ny1130/CVE-2022-39197-fix_patch
- https://github.com/ARPSyndicate/cvemon
- https://github.com/Awrrays/Pentest-Tips
- https://github.com/CKevens/Cobalt-Strike-4.5-Secondary-modification
- https://github.com/CVEDB/PoC-List
- https://github.com/CVEDB/awesome-cve-repo
- https://github.com/CVEDB/top
- https://github.com/GhostTroops/TOP
- https://github.com/KlinKlinKlin/CS_Agent_INA
- https://github.com/LztCode/cobaltstrike4.5_cdf
- https://github.com/NaInSec/CVE-PoC-in-GitHub
- https://github.com/Ostorlab/KEV
- https://github.com/Ostorlab/known_exploited_vulnerbilities_detectors
- https://github.com/Potato-py/csIntruder
- https://github.com/ProbiusOfficial/Awsome-Sec.CTF-Videomaker
- https://github.com/PyterSmithDarkGhost/CVE-2022-39197-POC
- https://github.com/Romanc9/Gui-poc-test
- https://github.com/SYRTI/POC_to_review
- https://github.com/Security-Rules/cobaltstrike4.5_cdf
- https://github.com/SiJiDo/X
- https://github.com/TheCryingGame/CVE-2022-39197-RCE
- https://github.com/TryGOTry/CobaltStrike_Cat_4.5
- https://github.com/TryGOTry/DogCs4.4
- https://github.com/WhooAmii/POC_to_review
2024-05-26 16:36:09 +00:00
- https://github.com/Wine0000/cs_agent_plus
2024-05-25 21:48:12 +02:00
- https://github.com/adeljck/CVE-2022-39197
- https://github.com/aneasystone/github-trending
- https://github.com/atomxw/cobaltstrike4.5_cdf
- https://github.com/bestspear/SharkOne
- https://github.com/burpheart/CVE-2022-39197-patch
- https://github.com/burpheart/cve-2022-39197
- https://github.com/evilashz/Counter-Strike-1.6
- https://github.com/ginipropro/cobaltstrike4.5_cdf
- https://github.com/hktalent/TOP
- https://github.com/hluwa/cobaltstrike_swing_xss2rce
- https://github.com/its-arun/CVE-2022-39197
- https://github.com/izj007/wechat
- https://github.com/k0mi-tg/CVE-POC
- https://github.com/lovechoudoufu/about_cobaltstrike4.5_cdf
- https://github.com/luelueking/Java-CVE-Lists
- https://github.com/manas3c/CVE-POC
- https://github.com/nomi-sec/PoC-in-GitHub
- https://github.com/purple-WL/Cobaltstrike-RCE-CVE-2022-39197
- https://github.com/safe3s/CVE-2022-39197
- https://github.com/shen771/cobaltstrike4.5_cdf
- https://github.com/taielab/awesome-hacking-lists
- https://github.com/tanjiti/sec_profile
- https://github.com/trhacknon/Pocingit
- https://github.com/weeka10/-hktalent-TOP
- https://github.com/whoforget/CVE-POC
- https://github.com/winezer0/cs_agent_plus
- https://github.com/wwl012345/cobaltstrike4.5_cdf
- https://github.com/xiao-zhu-zhu/pig_CS4.4
- https://github.com/xzajyjs/CVE-2022-39197-POC
- https://github.com/youwizard/CVE-POC
- https://github.com/yqcs/CSPOC
- https://github.com/zecool/cve
- https://github.com/zeoday/cobaltstrike4.5_cdf-1