Secunia Security Advisory - r0t has reported a vulnerability in SupportPRO SupportDesk, which can be exploited by malicious users to conduct script insertion attacks.
dfca583a4046918d2ecd11545438bf60ede075dabf8af7ed3968fee91ce75dea
TITLE:
SupportPRO SupportDesk Ticket Script Insertion Vulnerability
SECUNIA ADVISORY ID:
SA17701
VERIFY ADVISORY:
http://secunia.com/advisories/17701/
CRITICAL:
Less critical
IMPACT:
Cross Site Scripting
WHERE:
>From remote
SOFTWARE:
SupportPRO SupportDesk
http://secunia.com/product/6208/
DESCRIPTION:
r0t has reported a vulnerability in SupportPRO SupportDesk, which can
be exploited by malicious users to conduct script insertion attacks.
Input passed when posting a ticket isn't properly sanitised before
being used. This can be exploited to inject arbitrary HTML and script
code, which will be executed in a user's browser session in context of
an affected site when the malicious user data is viewed.
SOLUTION:
Edit the source code to ensure that input is properly sanitised.
PROVIDED AND/OR DISCOVERED BY:
r0t
ORIGINAL ADVISORY:
http://pridels.blogspot.com/2005/11/supportpro-supportdesk-xss-vuln.html
----------------------------------------------------------------------
About:
This Advisory was delivered by Secunia as a free service to help
everybody keeping their systems up to date against the latest
vulnerabilities.
Subscribe:
http://secunia.com/secunia_security_advisories/
Definitions: (Criticality, Where etc.)
http://secunia.com/about_secunia_advisories/
Please Note:
Secunia recommends that you verify all advisories you receive by
clicking the link.
Secunia NEVER sends attached files with advisories.
Secunia does not advise people to install third party patches, only
use those supplied by the vendor.
----------------------------------------------------------------------