/¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯¯\ :Zendesk Multiple Vulnerabilities : \________________________________/ /Discovered By: \ |Luis Santana | \________________________________/ Overview ~_¯~_¯~_¯~_¯~_¯~_¯~_¯~_¯~_¯~_¯~ Luis Santana of the HackTalk Security team has found multiple vulnerabilities in Zendesk. Product Information ~_¯~_¯~_¯~_¯~_¯~_¯~_¯~_¯~_¯~_¯~ Product/Script: Zendesk Affected Version: Vulnerability Type: Multiple Security Risk: Multiple Vendor URL: http://zendesk.com Product/Script Demo: Vendor Status: Notified Patch/Fix Status: Patches Made Advisory Timeline: July 31st 9:34am EST - Zendesk Contacted about XSS July 31st 12:42pm EST - Ticket passed to Security Department July 31st 10:46pm EST - Zendesk has started producing patch. Given the go ahead to publicly disclose July 31st 1:00am EST - Found CSRF, continuing investigation August 1st 3:49pm EST - CSRF Patch in production August 4th 3:51am EST - CSRF patch being rolled out August 10th 3:36pm EST - Given the ok to post advisory publicly Advisory URL: http://hacktalk.net/exploit/exploit.php?n=10 Product Description ~_¯~_¯~_¯~_¯~_¯~_¯~_¯~_¯~_¯~_¯~ Web-based customer support software with elegant ticket mnagement and a self-service customer community platform. Agile, smart and convenient. (From http://www.zendesk.com) Vulnerability Details ~_¯~_¯~_¯~_¯~_¯~_¯~_¯~_¯~_¯~_¯~ XSS - The email address field of the anonymous_requests page is vulnerable to XSS due to lack of input sanitation. By crafting a malcious POST request an attacker is able to inject HTML, Javascript or AJAX into the anonymous_requests page. CSRF - Due to a lack of input sanitation many forms are vulnerable to CSRF. The most notable example is the new user creation form which allows an attacker to create a new administrative user. Proof of Concept ~_¯~_¯~_¯~_¯~_¯~_¯~_¯~_¯~_¯~_¯~ XSS -