exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New

eticket156-xss.txt

eticket156-xss.txt
Posted Jan 28, 2008
Authored by Alessandro Tanasi | Site tanasi.it

eTicket version 1.5.6-RC4 suffers from a cross site scripting vulnerability.

tags | exploit, xss
SHA-256 | 5c28a89d9866f0b6b900fbca6c5f86e59645564048de68cb55ce474a307852ea

eticket156-xss.txt

Change Mirror Download
________________________________________________________________________________

eTicket 'index.php' Cross Site Scripting Path Vulnerability
________________________________________________________________________________

Name: eTicket 'index.php' Cross Site Scripting Path
Vulnerability
Application: eTicket
Versions Affected: 1.5.6-RC4
Severity: Medium
Vendor: eTicket, http://sourceforge.net/projects/eticket
Bug: XSS Path vulnerability
Exploitation: Client side, remote
Author: Alessandro `jekil` Tanasi
email: alessandro@tanasi.it
web: http://www.tanasi.it
Date: 20/01/2008
Advisory:
http://www.lonerunners.net/users/jekil/pub/hack-eticket/hack-eticket.txt
________________________________________________________________________________

Table of contents:

I. Background
II. Description
III. Analysis
IV. Detection
V. Fix
VI. Vendor Response
VII. CVE Information
VIII. Disclousure timeline
IX. Credits
________________________________________________________________________________

I. BACKGROUND

eTicket is a PHP-based electronic (open source) support ticket system
based on osTicket, that can receive tickets via email (pop3/pipe) or a
web form. It also offers a ticket manager with many features. An ideal
helpdesk solution for any website.


II. DESCRIPTION

The application eTicket version 1.5.6-RC4 is prone to a Cross Site
Scripting Path vulnerability.


III. ANALYSIS

Attackers may exploit these issue through a web browser.
To exploit the cross-site scripting issues, an attacker must entice an
unsuspecting victim into visiting a malicious URI.


IV. DETECTION

Proof of concept:
http://example.com/index.php/"><script>alert('XSS')</script>


V. FIX

Properly validate user input.


VI. VENDOR RESPONSE

No vendor response at this time.


VII. CVE INFORMATION

No CVE at this time.


VIII. DISCLOSURE TIMELINE

21012008 Bug discovered
21012008 Vendor contacted


IX. CREDIT

Alessandro `jekil` Tanasi is credited with the discovery of this
vulnerability.
Login or Register to add favorites

File Archive:

April 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Apr 1st
    10 Files
  • 2
    Apr 2nd
    26 Files
  • 3
    Apr 3rd
    40 Files
  • 4
    Apr 4th
    6 Files
  • 5
    Apr 5th
    26 Files
  • 6
    Apr 6th
    0 Files
  • 7
    Apr 7th
    0 Files
  • 8
    Apr 8th
    22 Files
  • 9
    Apr 9th
    14 Files
  • 10
    Apr 10th
    10 Files
  • 11
    Apr 11th
    13 Files
  • 12
    Apr 12th
    14 Files
  • 13
    Apr 13th
    0 Files
  • 14
    Apr 14th
    0 Files
  • 15
    Apr 15th
    30 Files
  • 16
    Apr 16th
    10 Files
  • 17
    Apr 17th
    22 Files
  • 18
    Apr 18th
    45 Files
  • 19
    Apr 19th
    0 Files
  • 20
    Apr 20th
    0 Files
  • 21
    Apr 21st
    0 Files
  • 22
    Apr 22nd
    0 Files
  • 23
    Apr 23rd
    0 Files
  • 24
    Apr 24th
    0 Files
  • 25
    Apr 25th
    0 Files
  • 26
    Apr 26th
    0 Files
  • 27
    Apr 27th
    0 Files
  • 28
    Apr 28th
    0 Files
  • 29
    Apr 29th
    0 Files
  • 30
    Apr 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close