Bugtraq mailing list archives
Cerberus Helpdesk vulnerable to XSS
From: preben () watchcom no
Date: 30 Jan 2006 23:42:55 -0000
Inputs in the Cerberus Helpdesk is not properly sanitized, and XSS is possible in a lot of the systems input fields and url parameters. You can add XSS that will hit every user of the system, and even simple scripting tags like <script>alert(f)</script> is allowed PoC: http://www.SITE.example/tts2/clients.php?mode=search&sid=<sidvalue>&contact_search=<script>alert('c')</script> Vendors site: http://www.webgroupmedia.com Please credit to: Preben Nyløkken
Current thread:
- Cerberus Helpdesk vulnerable to XSS preben (Jan 31)