PT-2009-42: Cross-Site Request Forgery in Kayako Support Suite Vulnerable Software Kayako Support Suite Version 3.60.04 stable and possibly earlier Link: http://www.kayako.com/Security LevelSecurity Level: Medium Impact: Cross-Site Request Forgery Attack Vector: RemoteCVSS v2: Base Score: 7 Temporal Score: 5.2 Vector: (AV:N/AC:M/Au:S/C:C/I:P/A:N/E:U/RL:O/RC:C)CVE: not assignedSoftware DescriptionKayako Support Suite is a HelpDesk system.Vulnerability DescriptionPositive Technologies Research Team discovered several Cross-Site Request Forgery vulnerabilities in Kayako Support Suite.The application has insufficient protection against this type of attacks in all operations performed by the administrator and certain privileged user group operations.This type of attacks simulates a user request to a third party site. This vulnerability is rather widespread because of the peculiarity of the architecture of most web applications. More exactly, many web applications cannot determine for sure whether the request was generated by a valid user or not.The attack may be conducted to reach the following aims:1. If the administrator didn’t log off and logs in as a user from a privileged user group, then an attacker can give him a link to a page or attach an html file with malicious code that, once downloaded, will allow the user to perform arbitrary operations with administrator privileges (change the password, e-mail, etc.).2. If there is a privileged user group and there is no administrator session at the same time, then an attacker can: - create a user bypassing any checks - activate a user - change the e-mail of an arbitrary user - change the e-mail of the current privileged user groupThe vulnerability details are not disclosed.Solution Update your software up to the latest version (3.70.01).Bulletin Status10/12/2009 - Vendor notified 10/13/2009 - Vendor response 01/19/2010 - The vendor confirmed the vulnerability and issued a workaround decision 02/09/2010 - Requested status update from vendor 04/08/2010 - Public disclosureAcknowledgementsThis vulnerability was discovered by Timur Yunusov (Positive Technologies Research Team)Referenceshttp://www.securitylab.ru/lab/PT-2009-42 http://www.ptsecurity.ru/advisory.aspReports on the vulnerabilities previously discovered by Positive Technologies Research Team:http://www.securitylab.ru/lab/ http://www.ptsecurity.ru/advisory.asp