Files
CVEs-PoC/2017/CVE-2017-15580.md
2024-06-18 02:51:15 +02:00

21 lines
1.0 KiB
Markdown

### [CVE-2017-15580](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15580)
![](https://img.shields.io/static/v1?label=Product&message=n%2Fa&color=blue)
![](https://img.shields.io/static/v1?label=Version&message=n%2Fa&color=blue)
![](https://img.shields.io/static/v1?label=Vulnerability&message=n%2Fa&color=brighgreen)
### Description
osTicket 1.10.1 provides a functionality to upload 'html' files with associated formats. However, it does not properly validate the uploaded file's contents and thus accepts any type of file, such as with a tickets.php request that is modified with a .html extension changed to a .exe extension. An attacker can leverage this vulnerability to upload arbitrary files on the web application having malicious content.
### POC
#### Reference
- http://0day.today/exploits/28864
- https://cxsecurity.com/issue/WLB-2017100187
- https://packetstormsecurity.com/files/144747/osticket1101-shell.txt
- https://www.exploit-db.com/exploits/45169/
#### Github
- https://github.com/ARPSyndicate/cvemon