Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2023-52268 PoC — FreeScout 安全漏洞

Source
Associated Vulnerability
Title:FreeScout 安全漏洞 (CVE-2023-52268)
Description:The End-User Portal module before 1.0.65 for FreeScout sometimes allows an attacker to authenticate as an arbitrary user because a session token can be sent to the /auth endpoint. NOTE: this module is not part of freescout-helpdesk/freescout on GitHub.
Description
Authentication Bypass for FreeScout End-User Portal
Readme
# FreeScout End-User Portal Authentication Bypass Exploit (CVE-2023-52268)

## Overview

This exploit targets a vulnerability in the **FreeScout End-User Portal Module** (versions below 1.0.65) that allows an attacker to bypass authentication through improper session token management. By generating and testing session tokens, the attacker can gain unauthorized access to the ticketing system, impersonating users and accessing their support tickets. Crucially, the generated session tokens are mapped to other users than the one requesting the magic link authentication, allowing attackers to impersonate arbitrary users. If an administrative account session is compromised, the attacker gains full access to all support tickets on the platform.

### Why tho

The exploit takes advantage of weak session token management in the FreeScout End-User Portal's magic link authentication mechanism. Session tokens are **incorrectly mapped to other users** than the one initiating the request, meaning an attacker can generate session tokens that belong to different users on the platform. This flaw allows attackers to impersonate users and access their support tickets without needing to know their credentials.

### Impact

Support tickets often contain **sensitive information**, such as:

- User credentials for corporate systems / SaaS solutions
- Personal identifiable information (PII)
- Internal communications between users and support staff

### Responsible Disclosure

Vendor Notified: Yes <br>
Fix Available: Update FreeScount End-User Portal to latest version.
File Snapshot

[4.0K] /data/pocs/245db9dae614a45bf54aee6946650651f091f72a ├── [2.2K] exploit.py └── [1.5K] README.md 0 directories, 2 files
Shenlong Bot has cached this for you
Remarks
    1. It is advised to access via the original source first.
    2. Local POC snapshots are reserved for subscribers — if the original source is unavailable, the local mirror is part of the paid plan.
    3. Mirroring, verifying, and maintaining this POC archive takes ongoing effort, so local snapshots are a paid feature. Your subscription keeps the archive online — thank you for the support. View subscription plans →