SB2019080755 - Multiple vulnerabilities in osTicket.com osTicket
Published: August 7, 2019 Updated: July 17, 2020
Breakdown by Severity
- Low
- Medium
- High
- Critical
Description
This security bulletin contains information about 3 secuirty vulnerabilities.
1) Arbitrary file upload (CVE-ID: CVE-2019-14748)
The vulnerability allows a remote authenticated user to read and manipulate data.
An issue was discovered in osTicket before 1.10.7 and 1.12.x before 1.12.1. The Ticket creation form allows users to upload files along with queries. It was found that the file-upload functionality has fewer (or no) mitigations implemented for file content checks; also, the output is not handled properly, causing persistent XSS that leads to cookie stealing or malicious actions. For example, a non-agent user can upload a .html file, and Content-Disposition will be set to inline instead of attachment.
2) Improper Neutralization of Special Elements in Output Used by a Downstream Component (CVE-ID: CVE-2019-14749)
The vulnerability allows a remote non-authenticated attacker to execute arbitrary code.
An issue was discovered in osTicket before 1.10.7 and 1.12.x before 1.12.1. CSV (aka Formula) injection exists in the export spreadsheets functionality. These spreadsheets are generated dynamically from unvalidated or unfiltered user input in the Name and Internal Notes fields in the Users tab, and the Issue Summary field in the tickets tab. This allows other agents to download data in a .csv file format or .xls file format. This is used as input for spreadsheet applications such as Excel and OpenOffice Calc, resulting in a situation where cells in the spreadsheets can contain input from an untrusted source. As a result, the end user who is accessing the exported spreadsheet can be affected.
3) Cross-site scripting (CVE-ID: CVE-2019-14750)
The disclosed vulnerability allows a remote attacker to perform cross-site scripting (XSS) attacks.
The vulnerability exists due to insufficient sanitization of user-supplied data. A remote attacker can permanently inject and execute arbitrary HTML and script code in user's browser in context of vulnerable website.
Successful exploitation of this vulnerability may allow a remote attacker to steal potentially sensitive information, change appearance of the web page, perform phishing and drive-by-download attacks.
Remediation
Install update from vendor's website.
References
- http://packetstormsecurity.com/files/154003/osTicket-1.12-File-Upload-Cross-Site-Scripting.html
- https://github.com/osTicket/osTicket/commit/33ed106b1602f559a660a69f931a9d873685d1ba
- https://github.com/osTicket/osTicket/releases/tag/v1.10.7
- https://github.com/osTicket/osTicket/releases/tag/v1.12.1
- https://www.exploit-db.com/exploits/47224
- http://packetstormsecurity.com/files/154004/osTicket-1.12-Formula-Injection.html
- https://github.com/osTicket/osTicket/commit/99818486c5b1d8aa445cee232825418d6834f249
- https://www.exploit-db.com/exploits/47225
- http://packetstormsecurity.com/files/154005/osTicket-1.12-Cross-Site-Scripting.html
- https://github.com/osTicket/osTicket/commit/c3ba5b78261e07a883ad8fac28c214486c854e12
- https://www.exploit-db.com/exploits/47226