###########################################################
Ciaran McNally
Application: Helpdesk Pilot
http://www.helpdeskpilot.com/
Versions: All versions.
Platforms: Windows, Mac, Linux
Bug: XSS/CSRF Add Administrator
Exploitation: WEB
Date: 30 November 2013.
Author: Ciaran McNally
Web: http://makthepla.net/blog/=/helpdesk-pilot-add-admin
My Twitter: https://twitter.com/ciaranmak
Google Dork: intext:"powered by Helpdesk Pilot"
#######################################################################
1) Bug.
2) The exploit.
3) Fix.
###########################################################
Help desk software or your business...
###########################################################
======
1) Bug
======
If attacker can submit a ticket, he/she simply needs to include a malicious
Url within the the ticket.
Javascript injection then occurs via the Url that is incorrectly sanitized.
http://example.com/
###########################################################
===============
2) The "exploit"
===============
For a simple Proof of concept use the example above, you will see the
expected popup within the ticketing system once it's viewed.
To add an administrator use a malicious Url similar to the following...
(Make sure there are no spaces otherwise it won't be parsed correctly)
http://makthepla.net/
where [HOST] is the location of the software
and [ATTACKER_MAIL] is the attacker's email.
Attacker will recieve a mail if it successfully executes to complete
admin addition.
The example above contains alerts simply for POC, this is the one used
in the video on my blog post.
#######################################################################
======
3) Fix
======
Was Reported to the vendors twice,
Fix in progress...
#######################################################################
--
maK :)
--
-------------------------------------------
*-maK-*
Redbrick Administrator 2013/2014
Redbrick Webmaster 2012/2013
Redbrick Events Officer 2011/2012