Overview
ReadyDesk, version 9.1 and possibly others, contains SQL injection, path traversal, hard-coded cryptographic key, and arbitrary file upload vulnerabilities that may be leveraged to expose sensitive data and execute arbitrary code in the context of the vulnerable software.
Description
| ReadyDesk is a help desk ticketing web application designed to facilitate business internal or business to customer interactions. CWE-89: Improper Neutralization of Special Elements used in a SQL Command ('SQL Injection') - CVE-2016-5048 | 
Impact
| A remote, unauthenticated attacker can obtain sensitive database information, read arbitrary files, and execute arbitrary code in the context of the vulnerable software. | 
Solution
| The CERT/CC is currently unaware of a practical solution to these problems. A vendor advisory for version 9.2 states that it contains "Critical Security Updates," though details are not provided and it is unknown whether any of the vulnerabilities described above are addressed. | 
Vendor Information
CVSS Metrics
| Group | Score | Vector | 
|---|---|---|
| Base | 7.5 | AV:N/AC:L/Au:N/C:P/I:P/A:P | 
| Temporal | 6.4 | E:POC/RL:U/RC:UR | 
| Environmental | 4.8 | CDP:ND/TD:M/CR:ND/IR:ND/AR:ND | 
References
Acknowledgements
Thanks to Andrew Tierney of Pen Test Partners for reporting these vulnerabilities.
This document was written by Joel Land.
Other Information
| CVE IDs: | CVE-2016-5048, CVE-2016-5049, CVE-2016-5683, CVE-2016-5050 | 
| Date Public: | 2016-08-16 | 
| Date First Published: | 2016-08-16 | 
| Date Last Updated: | 2016-08-16 13:59 UTC | 
| Document Revision: | 21 |