An issue was discovered in osTicket before 1.10.7 and 1.12.x before 1.12.1. The Ticket creation form allows users to upload files along with queries. It was found that the file-upload functionality has fewer (or no) mitigations implemented for file content checks; also, the output is not handled properly, causing persistent XSS that leads to cookie stealing or malicious actions. For example, a non-agent user can upload a .html file, and Content-Disposition will be set to inline instead of attachment.
The product does not neutralize or incorrectly neutralizes user-controllable input before it is placed in output that is used as a web page that is served to other users.
Link | Tags |
---|---|
https://github.com/osTicket/osTicket/commit/33ed106b1602f559a660a69f931a9d873685d1ba | patch third party advisory release notes |
https://github.com/osTicket/osTicket/releases/tag/v1.12.1 | third party advisory |
https://github.com/osTicket/osTicket/releases/tag/v1.10.7 | third party advisory release notes |
http://packetstormsecurity.com/files/154003/osTicket-1.12-File-Upload-Cross-Site-Scripting.html | third party advisory vdb entry exploit |
https://www.exploit-db.com/exploits/47224 | third party advisory vdb entry exploit |