Vulnerabilities > CVE-2005-2462 - Unspecified vulnerability in Kayako Liveresponse 2.0
Attack vector
UNKNOWN Attack complexity
UNKNOWN Privileges required
UNKNOWN Confidentiality impact
UNKNOWN Integrity impact
UNKNOWN Availability impact
UNKNOWN kayako
nessus
Summary
Kayako liveResponse 2.x, when logging in a user, records the password in plaintext in the URL, which allows local users and possibly remote attackers to gain privileges.
Vulnerable Configurations
Part | Description | Count |
---|---|---|
Application | 1 |
Nessus
NASL family | CGI abuses |
NASL id | KAYAKO_LIVERESPONSE_MULT_FLAWS.NASL |
description | The remote host is running Kayako LiveResponse, a web-based live support system. The installed version of Kayako LiveResponse on the remote host fails to sanitize user-supplied input to many parameters / scripts, which makes the application vulnerable to SQL injection and cross-site scripting attacks. In addition, the application embeds passwords in plaintext as part of GET requests and will reveal its installation directory in response to direct calls to several scripts. |
last seen | 2020-06-01 |
modified | 2020-06-02 |
plugin id | 19335 |
published | 2005-08-01 |
reporter | This script is Copyright (C) 2005-2018 Tenable Network Security, Inc. |
source | https://www.tenable.com/plugins/nessus/19335 |
title | Kayako LiveResponse Multiple Vulnerabilities |
code |
|
References
- http://marc.info/?l=bugtraq&m=112274359718863&w=2
- http://marc.info/?l=bugtraq&m=112274359718863&w=2
- http://secunia.com/advisories/16286
- http://secunia.com/advisories/16286
- http://www.gulftech.org/?node=research&article_id=00092-07302005
- http://www.gulftech.org/?node=research&article_id=00092-07302005
- http://www.osvdb.org/18398
- http://www.osvdb.org/18398
- http://www.securityfocus.com/bid/14425
- http://www.securityfocus.com/bid/14425