exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New

supportsuite-xss.txt

supportsuite-xss.txt
Posted Dec 12, 2007
Authored by imei addmimistrator | Site myimei.com

SupportSuite version 3.00.32 suffers from a cross site scripting vulnerability.

tags | advisory, xss
SHA-256 | 9d7bdb29327ca1ca4cc89b70c362119f8754703fc408446368b0d0bb50718873

supportsuite-xss.txt

Change Mirror Download
——-Summary——
Software: SupportSuite
Sowtware's Web Site: http://www.kayako.com
Versions: 3.00.32
Class: Remote
Status: Unpatched
Exploit: Available
Solution: Not Available
Discovered by: imei Addmimistrator
Risk Level: Medium
——Description—–
Supportsuite , a great product of kayako, Ideal for providing ticket
based support, is prone to XSS attack in multiple internal files.{more
than 300 files}

Use of unsafe variable PHP_SELF in so many files of supprtsuite, makes
this program vulnerable against XSS attacks. The bug is in result of
using PHP_SELF variable that is unsafe in many version of PHP inside
of parameter used in function trigger_error().
Product has an "Anti Full path disclosure" approach come here:

if (!defined("INSWIFT")) {
trigger_error("Unable to process $PHP_SELF", E_USER_ERROR);
}
As it's obvious, It has a weakness against XSS.

VISITE ORIGINAL ADVISORY FOR MORE DETAILS
> http://myimei.com/security/2007-12-06/supportsuite-31101-multiple-file-php-self-xss.html

-------
BTW I have no idea what's wrong with moderators. they said my old post
has no detail and ask me for more details. I sent much posts like that
and users could refer to original advisory for understanding bug.
Should you always keep entire text in your site instead of poor bug
finder or its a really new policy!
--
imei Addmimistrator
Visit my SeQrity Homepage at:
http://myimei.com/security
Login or Register to add favorites

File Archive:

November 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Nov 1st
    30 Files
  • 2
    Nov 2nd
    0 Files
  • 3
    Nov 3rd
    0 Files
  • 4
    Nov 4th
    12 Files
  • 5
    Nov 5th
    44 Files
  • 6
    Nov 6th
    18 Files
  • 7
    Nov 7th
    9 Files
  • 8
    Nov 8th
    8 Files
  • 9
    Nov 9th
    3 Files
  • 10
    Nov 10th
    0 Files
  • 11
    Nov 11th
    0 Files
  • 12
    Nov 12th
    0 Files
  • 13
    Nov 13th
    0 Files
  • 14
    Nov 14th
    0 Files
  • 15
    Nov 15th
    0 Files
  • 16
    Nov 16th
    0 Files
  • 17
    Nov 17th
    0 Files
  • 18
    Nov 18th
    0 Files
  • 19
    Nov 19th
    0 Files
  • 20
    Nov 20th
    0 Files
  • 21
    Nov 21st
    0 Files
  • 22
    Nov 22nd
    0 Files
  • 23
    Nov 23rd
    0 Files
  • 24
    Nov 24th
    0 Files
  • 25
    Nov 25th
    0 Files
  • 26
    Nov 26th
    0 Files
  • 27
    Nov 27th
    0 Files
  • 28
    Nov 28th
    0 Files
  • 29
    Nov 29th
    0 Files
  • 30
    Nov 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2024 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close