# Exploit Title: AliveChat Cross Site Scripting
# Date: 29.02.2012
# Author: Sony
# Software Link: http://www.websitealive.com/
# Google Dorks: inurl:https://www.websitealive1.com
# Web Browser : Mozilla Firefox
# Blog : http://st2tea.blogspot.com
# PoC:
http://st2tea.blogspot.com/2012/02/alivechat-cross-site-scripting.html
..................................................................
Well, we have cross site scripting in the AliveChat (Operator Console).
Use demo (create new):
http://secure.websitealive.com/apps_v2/testdrive/?url= what you want (url)
https://www.websitealive3.com/7316/operator/operator/oConsole.asp?groupid=7316&operatorid=7152&winapp=&build=[our xss is here]
https://www.websitealive3.com/7315/operator/operator/oHeaderHotkeys.asp?usertype=operator&groupid=7315&operatorid=7151&action=addhotkey&hk_id=&hk_categoryid=1624[our xss is here]
Well, how to use it? Because it's a Operator Console..
Step 1:
We need to get information about :
https://www.websitealive3.com/7316/operator/operator/oConsole.asp?groupid=7316&operatorid=7152&winapp=&build=
Step 2:
We can create link with our xss and use this for xss phishing (the best).
(Don't do it)
0 comentarii:
Trimiteți un comentariu
Rețineți: Numai membrii acestui blog pot posta comentarii.