osTicket 1.10.1 provides a functionality to upload 'html' files with associated formats. However, it does not properly validate the uploaded file's contents and thus accepts any type of file, such as with a tickets.php request that is modified with a .html extension changed to a .exe extension. An attacker can leverage this vulnerability to upload arbitrary files on the web application having malicious content.
References
Configurations
History
21 Nov 2024, 03:14
Type | Values Removed | Values Added |
---|---|---|
References | () http://0day.today/exploits/28864 - Third Party Advisory | |
References | () http://nakedsecurity.com/cve/CVE-2017-15580/ - Third Party Advisory | |
References | () https://becomepentester.blogspot.com/2017/10/osTicket-File-Upload-Restrictions-Bypassed-CVE-2017-15580.html - Exploit, Third Party Advisory | |
References | () https://cxsecurity.com/issue/WLB-2017100187 - Exploit, Third Party Advisory | |
References | () https://packetstormsecurity.com/files/144747/osticket1101-shell.txt - Exploit, Third Party Advisory, VDB Entry | |
References | () https://www.cyber-security.ro/blog/2017/10/25/osticket-1-10-1-shell-upload/ - Broken Link | |
References | () https://www.exploit-db.com/exploits/45169/ - Exploit, Third Party Advisory, VDB Entry |
Information
Published : 2017-10-23 08:29
Updated : 2024-11-21 03:14
NVD link : CVE-2017-15580
Mitre link : CVE-2017-15580
CVE.ORG link : CVE-2017-15580
JSON object : View
Products Affected
osticket
- osticket
CWE
CWE-434
Unrestricted Upload of File with Dangerous Type