Cerberus Helpdesk vulnerable to XSS

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

 



Inputs in the Cerberus Helpdesk is not properly sanitized, and XSS is possible in a lot of the systems input fields and url parameters.

You can add XSS that will hit every user of the system, and even simple scripting tags like <script>alert(?f?)</script> is allowed

PoC: http://www.SITE.example/tts2/clients.php?mode=search&sid=<sidvalue>&contact_search=<script>alert('c')</script>

Vendor?s site:
http://www.webgroupmedia.com

Please credit to: Preben Nyløkken

[Index of Archives]     [Linux Security]     [Netfilter]     [PHP]     [Yosemite News]     [Linux Kernel]

  Powered by Linux