Korean
<< Back
VID 21641
Severity 30
Port 80, ...
Protocol TCP
Class CGI
Detailed Description A version of osTicket software which is older or as old as than version 1.3.1 is detected as installed on the host. osTicket is an open-source support ticket program for Microsoft Windows, Unix and Linux operating systems. osTicket version 1.3.1beta and earlier versions are vulnerable to multiple input validation vulnerabilities as listed in the below. A remote attacker who successfully exploited the most severe of these vulnerabilities could execute arbitrary code on the vulnerable system.

1) A SQL Injection Vulnerability: Input passed to the "ticket" parameter of the "class.ticket.php" code library isn't properly sanitized before being used in a SQL query. This can be exploited to manipulate SQL queries by injecting arbitrary SQL code.
2) A Local File Include Vulnerability: Input passed to the "inc" parameter of the "view.php" and "open.php" scripts isn't properly sanitized before being returned to the user. A remote authenticated attacker can exploit this flaw to run arbitrary PHP code found in files on the affected host provided PHP's 'register_globals' setting is enabled.

* References:
http://www.securityfocus.com/archive/1/403990/30/0/threaded
http://www.securitytracker.com/alerts/2005/Jul/1014373.html

* Platforms Affected:
osTicket, osTicket versions 1.3.1beta and earlier
Any operating system Any version
Recommendation No upgrade or patch available as of July 2005.

Upgrade to the latest version of osTicket, when new fixed version becomes available from the osTicket Download Web site at http://www.osticket.com/downloads.php
Related URL CVE-2005-2153,CVE-2005-2154 (CVE)
Related URL 14127 (SecurityFocus)
Related URL 21278,21281 (ISS)