An issue was discovered in osTicket before 1.10.7 and 1.12.x before 1.12.1. The Ticket creation form allows users to upload files along with queries. It was found that the file-upload functionality has fewer (or no) mitigations implemented for file content checks; also, the output is not handled properly, causing persistent XSS that leads to cookie stealing or malicious actions. For example, a non-agent user can upload a .html file, and Content-Disposition will be set to inline instead of attachment.
References
Link | Resource |
---|---|
https://github.com/osTicket/osTicket/releases/tag/v1.10.7 | Release Notes Third Party Advisory |
https://github.com/osTicket/osTicket/commit/33ed106b1602f559a660a69f931a9d873685d1ba | Patch Release Notes Third Party Advisory |
https://github.com/osTicket/osTicket/releases/tag/v1.12.1 | Third Party Advisory |
http://packetstormsecurity.com/files/154003/osTicket-1.12-File-Upload-Cross-Site-Scripting.html | Exploit Third Party Advisory VDB Entry |
https://www.exploit-db.com/exploits/47224 | Exploit Third Party Advisory VDB Entry |
Configurations
Configuration 1 (hide)
|
Information
Published : 2019-08-07 10:15
Updated : 2019-08-14 08:29
NVD link : CVE-2019-14748
Mitre link : CVE-2019-14748
JSON object : View
CWE
Products Affected
osticket
- osticket