BugTraq
Back to list
|
Post reply
Cerberus Helpdesk vulnerable to XSS
Jan 30 2006 11:42PM
preben watchcom no
Inputs in the Cerberus Helpdesk is not properly sanitized, and XSS is possible in a lot of the systems input fields and url parameters.
You can add XSS that will hit every user of the system, and even simple scripting tags like <script>alert(?f?)</script> is allowed
PoC: http://www.SITE.example/tts2/clients.php?mode=search&sid=<sidvalue>&cont
act_search=<script>alert('c')</script>
Vendor?s site:
http://www.webgroupmedia.com
Please credit to: Preben Nyløkken
[ reply ]
Privacy Statement
Copyright 2010, SecurityFocus
You can add XSS that will hit every user of the system, and even simple scripting tags like <script>alert(?f?)</script> is allowed
PoC: http://www.SITE.example/tts2/clients.php?mode=search&sid=<sidvalue>&cont
act_search=<script>alert('c')</script>
Vendor?s site:
http://www.webgroupmedia.com
Please credit to: Preben Nyløkken
[ reply ]