AOH :: HP Unsorted K :: BU-1577.HTM

Kayako SupportSuite Multiple Persistent Cross Site Scripting (Current Versions)



Kayako SupportSuite Multiple Persistent Cross Site Scripting (Current Versions)
Kayako SupportSuite Multiple Persistent Cross Site Scripting (Current Versions)



##########################################################=0D
# Comodo Group=0D
#=0D
# Vendor : Kayako Infotech Ltd.=0D
# URL : http://www.kayako.com/=0D 
# Version : Kayako SupportSuite <= 3.60.04=0D
##########################################################=0D
=0D
We've discovered multiple persistent cross site scripting vulnerabilities in the latest version of Kayako SupportSuite (3.60.04).  Because of improper input validation an attacker (authenticated staff member) can inject javascript code into the body or even subject of a knowledge base article which will execute in to context of the victim's browser when they view the pages in question.  THis makes it possible to steal cookies, hijack sessions and more.  The severity of this is augmented by the fact that the subjects of newly published articles appear on the home page of the portal making it easy to compromise a large number of users.=0D
=0D
The vendor has been notified, but until they issue a patch administrators can modify the relevant php themselves to do better input validation.=0D
=0D
BKz=0D
LPIC, Sec+, OSCP=0D
http://www.comodo.com/=0D 

The entire AOH site is optimized to look best in Firefox® 3 on a widescreen monitor (1440x900 or better).
Site design & layout copyright © 1986-2014 AOH
We do not send spam. If you have received spam bearing an artofhacking.com email address, please forward it with full headers to abuse@artofhacking.com.