Notice: Function _load_textdomain_just_in_time was called incorrectly. Translation loading for the wp-pagenavi domain was triggered too early. This is usually an indicator for some code in the plugin or theme running too early. Translations should be loaded at the init action or later. Please see Debugging in WordPress for more information. (This message was added in version 6.7.0.) in /home/u918112125/domains/exploit.company/public_html/wp-includes/functions.php on line 6114
Cross-Site Scripting in Help and Support Center - exploit.company
header-logo
Suggest Exploit
vendor:
Windows Help and Support Center
by:
Not mentioned
5.5
CVSS
MEDIUM
Cross-Site Scripting (XSS)
79
CWE
Product Name: Windows Help and Support Center
Affected Version From: Not mentioned
Affected Version To: Not mentioned
Patch Exists: YES
Related CWE: Not mentioned
CPE: a:microsoft:windows
Metasploit:
Other Scripts:
Platforms Tested: Windows
2010

Cross-Site Scripting in Help and Support Center

The Help and Support Center is vulnerable to cross-site scripting attacks due to inadequate input sanitization. An attacker can exploit this vulnerability to execute arbitrary script code in the browser's privileged zone of an unsuspecting user.

Mitigation:

To mitigate this vulnerability, it is recommended to apply the latest security patches provided by the vendor. Additionally, users should exercise caution when accessing unknown or untrusted websites.
Source

Exploit-DB raw data:

source: https://www.securityfocus.com/bid/40721/info

Help and Support Center is prone to a cross-site scripting weakness because it fails to properly sanitize user-supplied input.

An attacker may leverage this issue to execute arbitrary script code in the privileged zone of the browser of an unsuspecting user.

NOTE: This issue is a weakness because the affected file is only accessible by trusted sources unless other vulnerabilities, such as BID 40725 (Microsoft Windows Help And Support Center Trusted Document Whitelist Bypass Vulnerability) are used to bypass the restrictions. This weakness may then be used to execute script code in the privileged zone of the browser by unauthorized sites.


The following example URI is available:

hcp://system/sysinfo/sysinfomain.htm?svr=<h1>test</h1>