Author: 1N3 Website: http://treadstonesecurity.blogspot.ca Vender Website: http://www.visualware.com/ Affected Product: MyConnection Server Affected Version: 9.7i (others may also be vulnerable) ABOUT: MyConnection Server (MCS) delivers a broad range of support managed automated and user initiated self-help connection testing and monitoring services directly via the browser to any online customer/location anywhere in the world. Due to a failure to sanitize certain GET variables passed to the connection test page (usually test.php), it is possible to inject client side javascript to run in the context of the user browsing the website. Several parameters including testtype, ver, cm, map, lines, duration and others appear to be vulnerable. POC: http://scrubbedhost.com/test.php?testtype=1">&codebase=myspeed.pathcom.com&location=Canada:%20Toronto,%20ON&ver=1">&cm=1">&map=1">&lines=1">&pps=1">&bpp=1">&codec=1">&provtext=1">&provtextextra=11">&provlink=1"> VULNERABLE CODE: * Both voiplines and testlength are written to the end user without being properly sanitized and thus vulnerable to reflective XSS. Current Settings

VoIP Lines Simulated:
Test Length:
Codec: