An issue was discovered in osTicket before 1.10.7 and 1.12.x before 1.12.1. The Ticket creation form allows users to upload files along with queries. It was found that the file-upload functionality has fewer (or no) mitigations implemented for file content checks; also, the output is not handled properly, causing persistent XSS that leads to cookie stealing or malicious actions. For example, a non-agent user can upload a .html file, and Content-Disposition will be set to inline instead of attachment.
References
Configurations
Configuration 1 (hide)
|
History
21 Nov 2024, 04:27
Type | Values Removed | Values Added |
---|---|---|
References | () http://packetstormsecurity.com/files/154003/osTicket-1.12-File-Upload-Cross-Site-Scripting.html - Exploit, Third Party Advisory, VDB Entry | |
References | () https://github.com/osTicket/osTicket/commit/33ed106b1602f559a660a69f931a9d873685d1ba - Patch, Release Notes, Third Party Advisory | |
References | () https://github.com/osTicket/osTicket/releases/tag/v1.10.7 - Release Notes, Third Party Advisory | |
References | () https://github.com/osTicket/osTicket/releases/tag/v1.12.1 - Third Party Advisory | |
References | () https://www.exploit-db.com/exploits/47224 - Exploit, Third Party Advisory, VDB Entry |
Information
Published : 2019-08-07 17:15
Updated : 2024-11-21 04:27
NVD link : CVE-2019-14748
Mitre link : CVE-2019-14748
CVE.ORG link : CVE-2019-14748
JSON object : View
Products Affected
osticket
- osticket