PT-2009-42: Cross-Site Request Forgery in Kayako Support Suite
Kayako Support Suite
Version 3.60.04 stable and possibly earlier
Security Level: Medium
Impact: Cross-Site Request Forgery
Attack Vector: Remote
Base Score: 7
Temporal Score: 5.2
CVE: not assigned
Kayako Support Suite is a HelpDesk system.
Positive Technologies Research Team discovered several Cross-Site Request Forgery vulnerabilities in Kayako Support Suite.
The application has insufficient protection against this type of attacks in all operations performed by the administrator and certain privileged user group operations.
This type of attacks simulates a user request to a third party site. This vulnerability is rather widespread because of the peculiarity of the architecture of most web applications. More exactly, many web applications cannot determine for sure whether the request was generated by a valid user or not.
The attack may be conducted to reach the following aims:
1. If the administrator didn’t log off and logs in as a user from a privileged user group, then an attacker can give him a link to a page or attach an html file with malicious code that, once downloaded, will allow the user to perform arbitrary operations with administrator privileges (change the password, e-mail, etc.).
2. If there is a privileged user group and there is no administrator session at the same time, then an attacker can:
- create a user bypassing any checks
- activate a user
- change the e-mail of an arbitrary user
- change the e-mail of the current privileged user group
The vulnerability details are not disclosed.
Update your software up to the latest version (3.70.01).
10/12/2009 - Vendor notified
10/13/2009 - Vendor response
01/19/2010 - The vendor confirmed the vulnerability and issued a workaround decision
02/09/2010 - Requested status update from vendor
04/08/2010 - Public disclosure
This vulnerability was discovered by Timur Yunusov (Positive Technologies Research Team)
Reports on the vulnerabilities previously discovered by Positive Technologies Research Team: