Files
CVEs-PoC/2012/CVE-2012-10032.md
T
2025-09-29 21:09:30 +02:00

21 lines
1.5 KiB
Markdown
Raw Blame History

This file contains ambiguous Unicode characters
This file contains Unicode characters that might be confused with other characters. If you think that this is intentional, you can safely ignore this warning. Use the Escape button to reveal them.
### [CVE-2012-10032](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-10032)
![](https://img.shields.io/static/v1?label=Product&message=Maxthon3%20Browser&color=blue)
![](https://img.shields.io/static/v1?label=Version&message=3.1.7%20build%20600%20&color=brightgreen)
![](https://img.shields.io/static/v1?label=Vulnerability&message=CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20(XSS%20or%20'Cross-site%20Scripting')&color=brightgreen)
![](https://img.shields.io/static/v1?label=Vulnerability&message=CWE-94%20Improper%20Control%20of%20Generation%20of%20Code%20('Code%20Injection')&color=brightgreen)
### Description
Maxthon3 versions prior to 3.3 are vulnerable to cross context scripting (XCS) via the about:history page. The browsers trusted zone improperly handles injected script content, allowing attackers to execute arbitrary JavaScript in a privileged context. This flaw enables modification of browser configuration and execution of arbitrary code through Maxthons exposed DOM APIs, including maxthon.program.Program.launch() and maxthon.io.writeDataURL(). Exploitation requires user interaction, typically by visiting a malicious webpage that triggers the injection.
### POC
#### Reference
- http://blog.malerisch.net/2012/12/maxthon-cross-context-scripting-xcs-about-history-rce.html
- https://www.exploit-db.com/exploits/23225
- https://www.vulncheck.com/advisories/maxthon3-xcs-trusted-zone-code-exec
#### Github
No PoCs found on GitHub currently.