EXPLOITDB-EDB-20350

EXPLOITDB python VERIFIED WORKING POC
Exploit for CVE-2012-2590 - ESCON SupportPortal Professional Edition 3.0 - XSS
AI Analysis

This exploit demonstrates a stored XSS vulnerability in ESCON SupportPortal Pro 3.0 by sending a malicious email with a JavaScript payload. The payload is injected into the email body and executed when the victim views the email in a vulnerable client.

Attack Type
XSS
Complexity
trivial
Reliability
reliable
MITRE ATT&CK
T1190 - Exploit Public-Facing Application T1059.007 - JavaScript
Loading exploit code...
Download ZIP Password: eip
Source
Platform Exploitdb
Type webapps
Platform windows
Language python
Files 1
Authors
loneferret
Vulnerability
CVE-2012-2590
ESCON SupportPortal Professional Edition 3.0 - XSS