lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [day] [month] [year] [list]
Message-ID: <20100121221716.14071.qmail@securityfocus.com>
Date: 21 Jan 2010 22:17:16 -0000
From: pen-test@...odo.com
To: bugtraq@...urityfocus.com
Subject: Kayako SupportSuite Multiple Persistent Cross Site Scripting
 (Current Versions)

##########################################################
# Comodo Group
#
# Vendor : Kayako Infotech Ltd.
# URL : http://www.kayako.com/
# Version : Kayako SupportSuite <= 3.60.04
##########################################################

We've discovered multiple persistent cross site scripting vulnerabilities in the latest version of Kayako SupportSuite (3.60.04).  Because of improper input validation an attacker (authenticated staff member) can inject javascript code into the body or even subject of a knowledge base article which will execute in to context of the victim's browser when they view the pages in question.  THis makes it possible to steal cookies, hijack sessions and more.  The severity of this is augmented by the fact that the subjects of newly published articles appear on the home page of the portal making it easy to compromise a large number of users.

The vendor has been notified, but until they issue a patch administrators can modify the relevant php themselves to do better input validation.

BKz
LPIC, Sec+, OSCP
http://www.comodo.com/

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ