HESK Multiple Cross-site Scripting (XSS) Vulnerabilities

Summary
This host is running HESK and is prone to multiple cross-site scripting vulnerabilities.
Impact
Successful exploitation will allow remote attackers to execute arbitrary HTML and script code in a user's browser session in context of affected website. Impact Level: Application
Solution
Upgrade to HESK version 2.3 or later. For updates refer to http://www.hesk.com/
Insight
The flaws are due to improper validation of - input passed via the 'hesk_settings[tmp_title]' and 'hesklang[ENCODING]' parameters to '/inc/header.inc.php'. - input passed via 'hesklang[attempt]' parameter to various files in '/inc/' directory. - input appended to the URL after '/language/en/text.php', before being returned to the user.
Affected
HESK version 2.2 and prior.
References