osTicket 1.10.1 provides a functionality to upload 'html' files with associated formats. However, it does not properly validate the uploaded file's contents and thus accepts any type of file, such as with a tickets.php request that is modified with a .html extension changed to a .exe extension. An attacker can leverage this vulnerability to upload arbitrary files on the web application having malicious content.
The product allows the upload or transfer of dangerous file types that are automatically processed within its environment.
Link | Tags |
---|---|
https://becomepentester.blogspot.com/2017/10/osTicket-File-Upload-Restrictions-Bypassed-CVE-2017-15580.html | third party advisory exploit |
https://packetstormsecurity.com/files/144747/osticket1101-shell.txt | third party advisory vdb entry exploit |
https://www.exploit-db.com/exploits/45169/ | third party advisory vdb entry exploit |
http://0day.today/exploits/28864 | third party advisory |
https://cxsecurity.com/issue/WLB-2017100187 | third party advisory exploit |
https://www.cyber-security.ro/blog/2017/10/25/osticket-1-10-1-shell-upload/ | broken link |
http://nakedsecurity.com/cve/CVE-2017-15580/ | third party advisory |