# Exploit Title: AliveChat Cross Site Scripting # Date: 29.02.2012 # Author: Sony # Software Link: http://www.websitealive.com/ # Google Dorks: inurl:https://www.websitealive1.com # Web Browser : Mozilla Firefox # Blog : http://st2tea.blogspot.com # PoC: http://st2tea.blogspot.com/2012/02/alivechat-cross-site-scripting.html .................................................................. Well, we have cross site scripting in the AliveChat (Operator Console). Use demo (create new): http://secure.websitealive.com/apps_v2/testdrive/?url= what you want (url) https://www.websitealive3.com/7316/operator/operator/oConsole.asp?groupid=7316&operatorid=7152&winapp=&build=[ourxss is here] http://4.bp.blogspot.com/-wdZU_U84it8/T03_VHkEjoI/AAAAAAAAApI/WoPeByx7hn4/s1600/alive.JPG https://www.websitealive3.com/7315/operator/operator/oHeaderHotkeys.asp?usertype=operator&groupid=7315&operatorid=7151&action=addhotkey&hk_id=&hk_categoryid=1624[ourxss is here] http://3.bp.blogspot.com/-9zdtK3lAj5A/T03_pwK8uRI/AAAAAAAAApU/C5RmP8FF7xU/s1600/hotkeys.JPG Well, how to use it? Because it's a Operator Console.. Step 1: We need to get information about : https://www.websitealive3.com/ 7316/operator/operator/oConsole.asp?groupid=7316&operatorid=7152&winapp=&build= Step 2: We can create link with our xss and use this for xss phishing (the best).