AliveChat suffers from a cross site scripting vulnerability.
3ba907a2a1ddde8f9eeafe44610f701ec4c866da849c021d82239b377383029d
# Exploit Title: AliveChat Cross Site Scripting
# Date: 29.02.2012
# Author: Sony
# Software Link: http://www.websitealive.com/
# Google Dorks: inurl:https://www.websitealive1.com
# Web Browser : Mozilla Firefox
# Blog : http://st2tea.blogspot.com
# PoC:
http://st2tea.blogspot.com/2012/02/alivechat-cross-site-scripting.html
..................................................................
Well, we have cross site scripting in the AliveChat (Operator Console).
Use demo (create new):
http://secure.websitealive.com/apps_v2/testdrive/?url= what you want (url)
https://www.websitealive3.com/7316/operator/operator/oConsole.asp?groupid=7316&operatorid=7152&winapp=&build=[ourxss
is here]
http://4.bp.blogspot.com/-wdZU_U84it8/T03_VHkEjoI/AAAAAAAAApI/WoPeByx7hn4/s1600/alive.JPG
https://www.websitealive3.com/7315/operator/operator/oHeaderHotkeys.asp?usertype=operator&groupid=7315&operatorid=7151&action=addhotkey&hk_id=&hk_categoryid=1624[ourxss
is here]
http://3.bp.blogspot.com/-9zdtK3lAj5A/T03_pwK8uRI/AAAAAAAAApU/C5RmP8FF7xU/s1600/hotkeys.JPG
Well, how to use it? Because it's a Operator Console..
Step 1:
We need to get information about :
https://www.websitealive3.com/
<b>7316</b>/operator/operator/oConsole.asp?groupid=<b>7316</b>&operatorid=<b>7152</b>&winapp=&build=
Step 2:
We can create link with our xss and use this for xss phishing (the best).