SSRF exists in osTicket before 1.14.3, where an attacker can add malicious file to server or perform port scanning.
Max CVSS
9.8
EPSS Score
65.71%
Published
2020-11-02
Updated
2021-01-30
An issue was discovered in osTicket before 1.10.7 and 1.12.x before 1.12.1. CSV (aka Formula) injection exists in the export spreadsheets functionality. These spreadsheets are generated dynamically from unvalidated or unfiltered user input in the Name and Internal Notes fields in the Users tab, and the Issue Summary field in the tickets tab. This allows other agents to download data in a .csv file format or .xls file format. This is used as input for spreadsheet applications such as Excel and OpenOffice Calc, resulting in a situation where cells in the spreadsheets can contain input from an untrusted source. As a result, the end user who is accessing the exported spreadsheet can be affected.
Max CVSS
8.8
EPSS Score
6.32%
Published
2019-08-07
Updated
2020-08-24
Enhancesoft osTicket before 1.10.2 allows remote attackers to reset arbitrary passwords (when an associated e-mail address is known) by leveraging guest access and guessing a 6-digit number.
Max CVSS
8.1
EPSS Score
0.44%
Published
2018-03-27
Updated
2019-10-03
osTicket 1.10.1 provides a functionality to upload 'html' files with associated formats. However, it does not properly validate the uploaded file's contents and thus accepts any type of file, such as with a tickets.php request that is modified with a .html extension changed to a .exe extension. An attacker can leverage this vulnerability to upload arbitrary files on the web application having malicious content.
Max CVSS
9.8
EPSS Score
4.00%
Published
2017-10-23
Updated
2019-03-26
In osTicket before 1.10.1, SQL injection is possible by constructing an array via use of square brackets at the end of a parameter name, as demonstrated by the key parameter to file.php.
Max CVSS
9.8
EPSS Score
0.21%
Published
2017-09-12
Updated
2017-09-21
5 vulnerabilities found
This web site uses cookies for managing your session, storing preferences, website analytics and additional purposes described in our privacy policy.
By using this web site you are agreeing to CVEdetails.com terms of use!