Carnegie Mellon CERT warns of vulnerabilities in ReadyDesk help desk application

The CERT Division at Carnegie Mellon University issued an advisory on SQL injection, path traversal, hard-coded cryptographic key and arbitrary file upload vulnerabilities in ReadyDesk version 9.1.
The CERT Division at Carnegie Mellon University issued an advisory on SQL injection, path traversal, hard-coded cryptographic key and arbitrary file upload vulnerabilities in ReadyDesk version 9.1.

The CERT Division of Carnegie Mellon University's Software Engineering Institute has reported multiple vulnerabilities in web-based help desk application ReadyDesk, version 9.1 and possibly others.

In an Aug. 16 online advisory, CERT characterized the flaws as SQL injection, path traversal, hard-coded cryptographic key and arbitrary file upload vulnerabilities, and warned that attackers could exploit them, respectively, to “obtain sensitive database information, read arbitrary files and execute arbitrary code.”

The CERT is unaware of any practical solutions to these vulnerabilities, noting that a July 16 ReadyDesk advisory states that its version 9.2 contains "Critical Security Updates," but does not clarify if any of the problems found in version 9.1 were addressed.

According to its company website, ReadyDesk has more than 400,000 customers across a variety of industries, and offers such help desk services as support ticketing, customer portals, remote desktop and more.

You must be a registered member of SC Magazine to post a comment.

Sign up to our newsletters

TOP COMMENTS