This exploit demonstrates a reflected XSS vulnerability in RoundCube Webmail by injecting a malicious payload via the ERROR_MESSAGE parameter in the error.inc endpoint. The PoC also includes a method to leak the installation path via an additional endpoint.
Classification
Working Poc 90%
Attack Type
Xss
Complexity
Trivial
Reliability
Reliable
Target:RoundCube Webmail 0.2.X
No auth needed
Prerequisites:Access to the target RoundCube Webmail instance