An issue was discovered in osTicket before 1.10.7 and 1.12.x before 1.12.1. The Ticket creation form allows users to upload files along with queries. It was found that the file-upload functionality has fewer (or no) mitigations implemented for file content checks; also, the output is not handled properly, causing persistent XSS that leads to cookie stealing or malicious actions. For example, a non-agent user can upload a .html file, and Content-Disposition will be set to inline instead of attachment.
References
Link | Resource |
---|---|
http://packetstormsecurity.com/files/154003/osTicket-1.12-File-Upload-Cross-Site-Scripting.html | Exploit Third Party Advisory VDB Entry |
https://github.com/osTicket/osTicket/commit/33ed106b1602f559a660a69f931a9d873685d1ba | Patch Release Notes Third Party Advisory |
https://github.com/osTicket/osTicket/releases/tag/v1.10.7 | Release Notes Third Party Advisory |
https://github.com/osTicket/osTicket/releases/tag/v1.12.1 | Third Party Advisory |
https://www.exploit-db.com/exploits/47224 | Exploit Third Party Advisory VDB Entry |
History
No history.
MITRE Information
Status: PUBLISHED
Assigner: mitre
Published: 2019-08-07T16:38:58
Updated: 2019-08-13T13:28:48
Reserved: 2019-08-07T00:00:00
Link: CVE-2019-14748
JSON object: View
NVD Information
Status : Analyzed
Published: 2019-08-07T17:15:12.417
Modified: 2019-08-14T15:29:57.277
Link: CVE-2019-14748
JSON object: View
Redhat Information
No data.