miercuri, 29 februarie 2012

AliveChat Cross Site Scripting

# Exploit Title: AliveChat Cross Site Scripting
# Date: 29.02.2012
# Author: Sony

# Software Link: http://www.websitealive.com/
# Google Dorks: inurl:https://www.websitealive1.com
# Web Browser : Mozilla Firefox

# Blog : http://st2tea.blogspot.com
# PoC:
http://st2tea.blogspot.com/2012/02/alivechat-cross-site-scripting.html
..................................................................

Well, we have cross site scripting in the AliveChat (Operator Console).

Use demo (create new):


http://secure.websitealive.com/apps_v2/testdrive/?url= what you want (url)

https://www.websitealive3.com/7316/operator/operator/oConsole.asp?groupid=7316&operatorid=7152&winapp=&build=[our xss is here]


https://www.websitealive3.com/7315/operator/operator/oHeaderHotkeys.asp?usertype=operator&groupid=7315&operatorid=7151&action=addhotkey&hk_id=&hk_categoryid=1624[our xss is here]



Well, how to use it? Because it's a Operator Console..

Step 1:

We need to get information about :


https://www.websitealive3.com/7316/operator/operator/oConsole.asp?groupid=7316&operatorid=7152&winapp=&build=

Step 2:

We can create link with our xss and use this for xss phishing (the best).


(Don't do it)

0 comentarii:

Trimiteți un comentariu

Rețineți: Numai membrii acestui blog pot posta comentarii.