osTicket 1.10.1 provides a functionality to upload 'html' files with associated formats. However, it does not properly validate the uploaded file's contents and thus accepts any type of file, such as with a tickets.php request that is modified with a .html extension changed to a .exe extension. An attacker can leverage this vulnerability to upload arbitrary files on the web application having malicious content.
References
Link | Resource |
---|---|
https://becomepentester.blogspot.com/2017/10/osTicket-File-Upload-Restrictions-Bypassed-CVE-2017-15580.html | Exploit Third Party Advisory |
https://www.exploit-db.com/exploits/45169/ | Exploit Third Party Advisory VDB Entry |
https://www.cyber-security.ro/blog/2017/10/25/osticket-1-10-1-shell-upload/ | Broken Link |
https://packetstormsecurity.com/files/144747/osticket1101-shell.txt | Exploit Third Party Advisory VDB Entry |
https://cxsecurity.com/issue/WLB-2017100187 | Exploit Third Party Advisory |
http://nakedsecurity.com/cve/CVE-2017-15580/ | Third Party Advisory |
http://0day.today/exploits/28864 | Third Party Advisory |
Configurations
Information
Published : 2017-10-23 01:29
Updated : 2019-03-26 10:59
NVD link : CVE-2017-15580
Mitre link : CVE-2017-15580
JSON object : View
CWE
CWE-434
Unrestricted Upload of File with Dangerous Type
Products Affected
osticket
- osticket