[UNIX] eSupport Cross Site Scripting

From: SecuriTeam (support_at_securiteam.com)
Date: 03/23/05

  • Next message: SecuriTeam: "[UNIX] phpMyFamily SQL Injection"
    To: list@securiteam.com
    Date: 23 Mar 2005 20:05:41 +0200
    
    

    The following security advisory is sent to the securiteam mailing list, and can be found at the SecuriTeam web site: http://www.securiteam.com
    - - promotion

    The SecuriTeam alerts list - Free, Accurate, Independent.

    Get your security news from a reliable source.
    http://www.securiteam.com/mailinglist.html

    - - - - - - - - -

      eSupport Cross Site Scripting
    ------------------------------------------------------------------------

    SUMMARY

     <http://www.kayako.com/> Kayako eSupport is "a popular helpdesk, and
    support software. It is used by many businesses for customer support
    purposes".

    eSupport is prone to cross site scripting attacks that allows an attacker
    to use the application as an attack vector, or an attacker to access
    sensitive user information.

    DETAILS

    Vulnerable Systems:
     * Kayako eSupport version 2.3

    Cross site scripting exists in Kayako eSupport. This vulnerability exists
    due to user supplied input not being checked properly. Below are a few
    benign examples of the previously mentioned issues:
    http://path/index.php?_a=knowledgebase&_j=questiondetails&_i=[INT][XSS]
    http://path/index.php?_a=knowledgebase&_j=questionprint&_i=[INT][XSS]
    http://path/index.php?_a=troubleshooter&_c=[INT][XSS]
    http://path/index.php?_a=knowledgebase&_j=subcat&_i=[INT][XSS]

    This vulnerability could be used to steal cookie based authentication
    credentials within the scope of the current domain, or render hostile code
    in a victim's browser. Where [INT] and [XSS] should be a valid integer and
    your choice of code, for example: "><h1>Cross Site Scripting</h1>

    ADDITIONAL INFORMATION

    The information has been provided by <mailto:security@gulftech.org> James
    Bercegay.

    ========================================

    This bulletin is sent to members of the SecuriTeam mailing list.
    To unsubscribe from the list, send mail with an empty subject line and body to: list-unsubscribe@securiteam.com
    In order to subscribe to the mailing list, simply forward this email to: list-subscribe@securiteam.com

    ====================
    ====================

    DISCLAIMER:
    The information in this bulletin is provided "AS IS" without warranty of any kind.
    In no event shall we be liable for any damages whatsoever including direct, indirect, incidental, consequential, loss of business profits or special damages.


  • Next message: SecuriTeam: "[UNIX] phpMyFamily SQL Injection"

    Relevant Pages

    • [UNIX] Multiple Vulnerabilities in Kayako eSupport
      ... The following security advisory is sent to the securiteam mailing list, and can be found at the SecuriTeam web site: http://www.securiteam.com ... The Kayako eSupport product has been found to contain multiple ... vulnerabilities that range from cross site scripting issues to SQL ... A cross site scripting vulnerability exists in Kayako eSupport. ...
      (Securiteam)
    • [UNIX] Multiple Vulnerabilities MetaDot Portal Server
      ... The following security advisory is sent to the securiteam mailing list, and can be found at the SecuriTeam web site: http://www.securiteam.com ... SQL Injection: ... query he can cause an error message to execute script into an unsuspecting ... users browser thus causing a Cross Site Scripting attack. ...
      (Securiteam)
    • [UNIX] Multiple Vulnerabilities in XMB Forum (CSS, SQL Injection, Administrative Password Disclosure
      ... The following security advisory is sent to the securiteam mailing list, and can be found at the SecuriTeam web site: http://www.securiteam.com ... A cross site scripting bug exists in u2u.php as well. ... An SQL injection and a cross site-scripting bug in member.php (only ... Yet more SQL injections and XSS vulnerabilities exists, ...
      (Securiteam)
    • [UNIX] Multiple Vulnerabilities in Moodle (view.php, file.php)
      ... The following security advisory is sent to the securiteam mailing list, and can be found at the SecuriTeam web site: http://www.securiteam.com ... Cross Site Scripting in /mod/forum/view.php ... session ID we can use cross site scripting vulnerability. ... Session File Disclosure vulnerability is patched in version 1.4.3. ...
      (Securiteam)
    • [UNIX] Cyphor Multiple Security Vulnerabilities (SQL Injection and CSS)
      ... The following security advisory is sent to the securiteam mailing list, and can be found at the SecuriTeam web site: http://www.securiteam.com ... normal users, moderators and administrators. ... SQL Injection in 'Forgot Password Interface': ... The following URL will trigger an cross site scripting attack against ...
      (Securiteam)