# Exploit Title: AliveChat Cross Site Scripting
# Date: 29.02.2012
# Author: Sony
# Software Link: http://www.websitealive.com/
# Google Dorks: inurl:https://www.websitealive1.com
# Web Browser : Mozilla Firefox
# Blog : http://st2tea.blogspot.com
# PoC:
http://st2tea.blogspot.com/2012/02/alivechat-cross-site-scripting.html
..................................................................
Well, we have cross site scripting in the AliveChat (Operator Console).
Use demo (create new):
http://secure.websitealive.com/apps_v2/testdrive/?url= what you want (url)
https://www.websitealive3.com/7316/operator/operator/oConsole.asp?groupid=7316&operatorid=7152&winapp=&build=[our xss is here]
https://www.websitealive3.com/7315/operator/operator/oHeaderHotkeys.asp?usertype=operator&groupid=7315&operatorid=7151&action=addhotkey&hk_id=&hk_categoryid=1624[our xss is here]
Well, how to use it? Because it's a Operator Console..
Step 1:
We need to get information about :
https://www.websitealive3.com/7316/operator/operator/oConsole.asp?groupid=7316&operatorid=7152&winapp=&build=
Step 2:
We can create link with our xss and use this for xss phishing (the best).
(Don't do it)
Se afișează postările cu eticheta AliveChat. Afișați toate postările
Se afișează postările cu eticheta AliveChat. Afișați toate postările