Korean
<< Back
VID 21670
Severity 30
Port 80, ...
Protocol TCP
Class CGI
Detailed Description The Kayako eSupport software is vulnerable to multiple input validation vulnerabilities. Kayako eSupport is a help desk support system written in PHP. Kayako eSupport 2.x are vulnerable to multiple input validation vulnerabilities, which can be exploited by remote attackers to conduct cross-site scripting and SQL injection attacks.

1) Multiple SQL Injection Vulnerabilities: Input passed to the "subcat", "rate", "questiondetails", "ticketkey22", "email22" parameters of the "index.php" script, and the e-mail field of the Forgot Key feature isn't properly sanitized before being used in a SQL query. This can be exploited to manipulate SQL queries by injecting arbitrary SQL code.
2) A Cross-Site Scripting Vulnerability: Input passed to the "searchm" parameter in the "index.php" script isn't properly sanitized before being returned to the user. This can be exploited to execute arbitrary HTML and script code in a user's browser session in context of a vulnerable site.

* References:
http://archives.neohapsis.com/archives/bugtraq/2004-12/0238.html
http://www.gulftech.org/?node=research&article_id=00056-12182004
http://secunia.com/advisories/13563/

* Platforms Affected:
Kayako eSupport 2.x
Any operating system Any version
Recommendation No upgrade or patch available as of August 2005.

Upgrade to the latest version of Kayako eSupport, when new fixed version becomes available from the Kayako Web Solutions Web site at http://www.kayako.com/?_a=hms
Related URL CVE-2004-1412,CVE-2004-1413 (CVE)
Related URL 12037 (SecurityFocus)
Related URL 18571,18572 (ISS)