### [CVE-2022-39197](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-39197) ![](https://img.shields.io/static/v1?label=Product&message=n%2Fa&color=blue) ![](https://img.shields.io/static/v1?label=Version&message=n%2Fa&color=blue) ![](https://img.shields.io/static/v1?label=Vulnerability&message=n%2Fa&color=brighgreen) ### Description An XSS (Cross Site Scripting) vulnerability was found in HelpSystems Cobalt Strike through 4.7 that allowed a remote attacker to execute HTML on the Cobalt Strike teamserver. To exploit the vulnerability, one must first inspect a Cobalt Strike payload, and then modify the username field in the payload (or create a new payload with the extracted information and then modify that username field to be malformed). ### POC #### Reference - https://www.cobaltstrike.com/blog/out-of-band-update-cobalt-strike-4-7-1/ - https://www.cobaltstrike.com/blog/tag/release/ #### Github - https://github.com/20142995/sectool - https://github.com/4nth0ny1130/CVE-2022-39197-fix_patch - https://github.com/ARPSyndicate/cvemon - https://github.com/Awrrays/Pentest-Tips - https://github.com/CKevens/Cobalt-Strike-4.5-Secondary-modification - https://github.com/CVEDB/PoC-List - https://github.com/CVEDB/awesome-cve-repo - https://github.com/CVEDB/top - https://github.com/GhostTroops/TOP - https://github.com/KlinKlinKlin/CS_Agent_INA - https://github.com/LztCode/cobaltstrike4.5_cdf - https://github.com/NaInSec/CVE-PoC-in-GitHub - https://github.com/Ostorlab/KEV - https://github.com/Ostorlab/known_exploited_vulnerbilities_detectors - https://github.com/Potato-py/csIntruder - https://github.com/ProbiusOfficial/Awsome-Sec.CTF-Videomaker - https://github.com/PyterSmithDarkGhost/CVE-2022-39197-POC - https://github.com/Romanc9/Gui-poc-test - https://github.com/SYRTI/POC_to_review - https://github.com/Security-Rules/cobaltstrike4.5_cdf - https://github.com/SiJiDo/X - https://github.com/TheCryingGame/CVE-2022-39197-RCE - https://github.com/TryGOTry/CobaltStrike_Cat_4.5 - https://github.com/TryGOTry/DogCs4.4 - https://github.com/WhooAmii/POC_to_review - https://github.com/Wine0000/cs_agent_plus - https://github.com/adeljck/CVE-2022-39197 - https://github.com/aneasystone/github-trending - https://github.com/atomxw/cobaltstrike4.5_cdf - https://github.com/bestspear/SharkOne - https://github.com/burpheart/CVE-2022-39197-patch - https://github.com/burpheart/cve-2022-39197 - https://github.com/evilashz/Counter-Strike-1.6 - https://github.com/ginipropro/cobaltstrike4.5_cdf - https://github.com/hktalent/TOP - https://github.com/hluwa/cobaltstrike_swing_xss2rce - https://github.com/its-arun/CVE-2022-39197 - https://github.com/izj007/wechat - https://github.com/k0mi-tg/CVE-POC - https://github.com/lovechoudoufu/about_cobaltstrike4.5_cdf - https://github.com/luelueking/Java-CVE-Lists - https://github.com/manas3c/CVE-POC - https://github.com/nomi-sec/PoC-in-GitHub - https://github.com/purple-WL/Cobaltstrike-RCE-CVE-2022-39197 - https://github.com/safe3s/CVE-2022-39197 - https://github.com/shen771/cobaltstrike4.5_cdf - https://github.com/taielab/awesome-hacking-lists - https://github.com/tanjiti/sec_profile - https://github.com/trhacknon/Pocingit - https://github.com/weeka10/-hktalent-TOP - https://github.com/whoforget/CVE-POC - https://github.com/winezer0/cs_agent_plus - https://github.com/wwl012345/cobaltstrike4.5_cdf - https://github.com/xiao-zhu-zhu/pig_CS4.4 - https://github.com/xzajyjs/CVE-2022-39197-POC - https://github.com/youwizard/CVE-POC - https://github.com/yqcs/CSPOC - https://github.com/zecool/cve - https://github.com/zeoday/cobaltstrike4.5_cdf-1