osTicket 1.10.1 provides a functionality to upload 'html' files with associated formats. However, it does not properly validate the uploaded file's contents and thus accepts any type of file, such as with a tickets.php request that is modified with a .html extension changed to a .exe extension. An attacker can leverage this vulnerability to upload arbitrary files on the web application having malicious content.
References
Link | Resource |
---|---|
http://0day.today/exploits/28864 | Third Party Advisory |
http://nakedsecurity.com/cve/CVE-2017-15580/ | Third Party Advisory |
https://becomepentester.blogspot.com/2017/10/osTicket-File-Upload-Restrictions-Bypassed-CVE-2017-15580.html | Exploit Third Party Advisory |
https://cxsecurity.com/issue/WLB-2017100187 | Exploit Third Party Advisory |
https://packetstormsecurity.com/files/144747/osticket1101-shell.txt | Exploit Third Party Advisory VDB Entry |
https://www.cyber-security.ro/blog/2017/10/25/osticket-1-10-1-shell-upload/ | Broken Link |
https://www.exploit-db.com/exploits/45169/ | Exploit Third Party Advisory VDB Entry |
History
No history.
MITRE Information
Status: PUBLISHED
Assigner: mitre
Published: 2017-10-23T08:00:00
Updated: 2019-03-15T21:57:01
Reserved: 2017-10-17T00:00:00
Link: CVE-2017-15580
JSON object: View
NVD Information
Status : Analyzed
Published: 2017-10-23T08:29:00.713
Modified: 2019-03-26T17:59:46.433
Link: CVE-2017-15580
JSON object: View
Redhat Information
No data.
CWE