Author: Jakub Zoczek [zoczus@gmail.com] CVE Reference: CVE-2013-7033 Product: LiveZilla Vendor: LiveZilla GmbH [http://livezilla.net] Affected version: 5.1.2.0 Severity: Medium CVSSv2 Score: 4.3 (AV:N/AC:M/Au:N/C:P/I:N/A:N) Status: Partly fixed 0x01 Background LiveZilla, the widely-used and trusted Live Help and Live Support System. 0x02 Description LiveZilla in version 5.1.2.0 is prone to insecure password storage. Attacker using for example XSS attack is able to get currently logged operator's username and password string (plaintext). 0x03 Proof of Concept alert('User: ' + loginName + ' password: ' + loginPassword); http://postimg.org/image/vvw7e2zoz/ 0x04 Fix Vulnerability was partly fixed in LiveZilla 5.1.2.1 version. Now passwords are stored as md5 hash, but it's still accesable from javascript. 0x05 Timeline 08.12.2013 - Vendor notified 09.12.2013 - Vendor responded with informations about planned release 10.12.2013 - Version 5.1.2.1 released 15.12.2013 - Public Disclosure