Bugtraq mailing list archives

Cerberus Helpdesk vulnerable to XSS


From: preben () watchcom no
Date: 30 Jan 2006 23:42:55 -0000

Inputs in the Cerberus Helpdesk is not properly sanitized, and XSS is possible in a lot of the systems input fields and 
url parameters.

You can add XSS that will hit every user of the system, and even simple scripting tags like <script>alert(‘f’)</script> 
is allowed

PoC: http://www.SITE.example/tts2/clients.php?mode=search&sid=<sidvalue>&contact_search=<script>alert('c')</script>

Vendor’s site:
http://www.webgroupmedia.com

Please credit to: Preben Nyløkken


Current thread: