In osTicket before 1.12, XSS exists via /upload/file.php, /upload/scp/users.php?do=import-users, and /upload/scp/ajax.php/users/import if an agent manager user uploads a crafted .csv file to the User Importer, because file contents can appear in an error message. The XSS can lead to local file inclusion.
The product does not neutralize or incorrectly neutralizes user-controllable input before it is placed in output that is used as a web page that is served to other users.
Link | Tags |
---|---|
https://www.exploit-db.com/exploits/46753/ | third party advisory vdb entry exploit |
https://github.com/osTicket/osTicket/pull/4869 | third party advisory |
https://pentest.com.tr/exploits/osTicket-v1-11-XSS-to-LFI.html | third party advisory exploit |
https://www.exploit-db.com/exploits/46753 | third party advisory vdb entry exploit |
https://github.com/osTicket/osTicket/releases/tag/v1.12 | third party advisory |