PT-2011-43: Database information disclosure in Kayako Fusion
Severity level: Medium
Impact: Database information disclosure
Access Vector: Network exploitable
Base Score: 6.5
CVE: not assigned
Kayako Fusion is the world's leading multi-channel helpdesk solution that enables organizations to deliver a better customer experience and work more effectively as a team, whatever their size.
Whether over email, support tickets, self-help, live chat or voice, your customers' support history is tracked in one place and can be accessed from anywhere.
A vulnerability has been discovered in Kayako Fusion, which can be exploited by a malicious person with a 'staff' privileged user account.
The vulnerability exists in the logic of report generation, which is based on Kayako Query Language (KQL). An authorized 'staff' user can generate a report containing usernames and hashed password of all system users.
How to fix
25.11.2011 - Vendor is notified
25.11.2011 - Vendor gets vulnerability details
25.11.2011 - Vendor releases fixed version and details
02.12.2011 - Public disclosure
The vulnerability was discovered by Yuri Goltsev, Alexander Zaitsev, Positive Research Center (Positive Technologies Company)
Reports on the vulnerabilities previously discovered by Positive Research: