### [CVE-2017-15580](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15580) ![](https://img.shields.io/static/v1?label=Product&message=n%2Fa&color=blue) ![](https://img.shields.io/static/v1?label=Version&message=n%2Fa&color=blue) ![](https://img.shields.io/static/v1?label=Vulnerability&message=n%2Fa&color=brighgreen) ### Description osTicket 1.10.1 provides a functionality to upload 'html' files with associated formats. However, it does not properly validate the uploaded file's contents and thus accepts any type of file, such as with a tickets.php request that is modified with a .html extension changed to a .exe extension. An attacker can leverage this vulnerability to upload arbitrary files on the web application having malicious content. ### POC #### Reference - http://0day.today/exploits/28864 - https://cxsecurity.com/issue/WLB-2017100187 - https://packetstormsecurity.com/files/144747/osticket1101-shell.txt - https://www.exploit-db.com/exploits/45169/ #### Github - https://github.com/ARPSyndicate/cvemon