[UNIX] eSupport Cross Site Scripting
From: SecuriTeam (support_at_securiteam.com)
To: email@example.com Date: 23 Mar 2005 20:05:41 +0200
The following security advisory is sent to the securiteam mailing list, and can be found at the SecuriTeam web site: http://www.securiteam.com
- - promotion
The SecuriTeam alerts list - Free, Accurate, Independent.
Get your security news from a reliable source.
- - - - - - - - -
eSupport Cross Site Scripting
<http://www.kayako.com/> Kayako eSupport is "a popular helpdesk, and
support software. It is used by many businesses for customer support
eSupport is prone to cross site scripting attacks that allows an attacker
to use the application as an attack vector, or an attacker to access
sensitive user information.
* Kayako eSupport version 2.3
Cross site scripting exists in Kayako eSupport. This vulnerability exists
due to user supplied input not being checked properly. Below are a few
benign examples of the previously mentioned issues:
This vulnerability could be used to steal cookie based authentication
credentials within the scope of the current domain, or render hostile code
in a victim's browser. Where [INT] and [XSS] should be a valid integer and
your choice of code, for example: "><h1>Cross Site Scripting</h1>
The information has been provided by <mailto:firstname.lastname@example.org> James
This bulletin is sent to members of the SecuriTeam mailing list.
To unsubscribe from the list, send mail with an empty subject line and body to: email@example.com
In order to subscribe to the mailing list, simply forward this email to: firstname.lastname@example.org
The information in this bulletin is provided "AS IS" without warranty of any kind.
In no event shall we be liable for any damages whatsoever including direct, indirect, incidental, consequential, loss of business profits or special damages.