# ExploitTitle:ZendeskAppSweetHawkSurvey1.6-PersistentCross-SiteScripting
# Date:2019-12-17
# ExploitAuthor:MTK
# VendorHomepage: https://sweethawk.co/zendesk/survey-app
# SoftwareLink: https://www.zendesk.com/apps/support/survey/
# Version:Uptov1.6
# Tested on:Zendesk-Firefox/Windows
# Software description:
# SweetHawkSurvey app ask customers for a 0-10 score instead of the normal good or bad question.
# You can get more granular satisfaction data without compromising the response rate.
# Ask an optional NPS question on the landing page. View reports and drill down into the response
# detail and go directly totheticket. Easytoset up, just replace the survey place holder in
# your trigger or automation. Customize the landing pages for each of your brands.
# TechnicalDetails&Impact:
# Attackers use vulnerable web pages toinject malicious code and have it stored on the web server
# for later use. The payload is automatically served tousers who browse web pages and executed in
# their context. Thus, the victims do not need toclick on a malicious link torun the payload.
# All they have todo is visit a vulnerable web page.
# POC1.OpenSupport ticket in Zendesk and send XSS payload e.g;<script>alert(1);</script>2.Generate surveyrequest torate the ticket and payload will execute;
# Time line
09-19-2019-Vulnerability discovered
09-20-2019-Vendor contacted
12-02-2019-Detailed report shared and full disclosure time line given withno response
12-17-2019-FullDisclosure