duminică, 26 februarie 2012

WonderDesk Cross Site Scripting

# Exploit Title: WonderDesk Cross Site Scripting
# Date: 26.02.2012
# Author: Sony

# Software Link: http://www.wonderdesk.com/
# Google Dorks: inurl:wonderdesk.cgi?do
# Web Browser : Mozilla Firefox

# Blog : http://st2tea.blogspot.com
# PoC:
http://st2tea.blogspot.com/2012/02/wonderdesk-cross-site-scripting.html
..................................................................

We have a multiple cross site scripting vulnerabilities in the WonderdDesk.

http://www.wonderdesk.com/demo.html

Use:

Log in as a customer.


http://www.wonderdesk.com/cgi-bin/wd4demo/wonderdesk.cgi?do=cust_lostpw
Email Address: our xss is here.



http://www.wonderdesk.com/cgi-bin/wd4demo/wonderdesk.cgi?do=hd_modify_record&modify_success=1&help_id=2844&

Persistent xss :

Fields:Web Site,Example URL,Subject,Correspondence..put our xss code and save this.



And we can see that a lot of edu sites..vuln to xss. (Steal cookies,xss phishing,etc.)

inurl:wonderdesk.cgi?do site:edu

Demo: Harvard, yes..



(i sent report for administrator)

It can be dangerous for users.

0 comentarii:

Trimiteți un comentariu

Rețineți: Numai membrii acestui blog pot posta comentarii.