exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New

eticket156-xss.txt

eticket156-xss.txt
Posted Jan 28, 2008
Authored by Alessandro Tanasi | Site tanasi.it

eTicket version 1.5.6-RC4 suffers from a cross site scripting vulnerability.

tags | exploit, xss
SHA-256 | 5c28a89d9866f0b6b900fbca6c5f86e59645564048de68cb55ce474a307852ea

eticket156-xss.txt

Change Mirror Download
________________________________________________________________________________

eTicket 'index.php' Cross Site Scripting Path Vulnerability
________________________________________________________________________________

Name: eTicket 'index.php' Cross Site Scripting Path
Vulnerability
Application: eTicket
Versions Affected: 1.5.6-RC4
Severity: Medium
Vendor: eTicket, http://sourceforge.net/projects/eticket
Bug: XSS Path vulnerability
Exploitation: Client side, remote
Author: Alessandro `jekil` Tanasi
email: alessandro@tanasi.it
web: http://www.tanasi.it
Date: 20/01/2008
Advisory:
http://www.lonerunners.net/users/jekil/pub/hack-eticket/hack-eticket.txt
________________________________________________________________________________

Table of contents:

I. Background
II. Description
III. Analysis
IV. Detection
V. Fix
VI. Vendor Response
VII. CVE Information
VIII. Disclousure timeline
IX. Credits
________________________________________________________________________________

I. BACKGROUND

eTicket is a PHP-based electronic (open source) support ticket system
based on osTicket, that can receive tickets via email (pop3/pipe) or a
web form. It also offers a ticket manager with many features. An ideal
helpdesk solution for any website.


II. DESCRIPTION

The application eTicket version 1.5.6-RC4 is prone to a Cross Site
Scripting Path vulnerability.


III. ANALYSIS

Attackers may exploit these issue through a web browser.
To exploit the cross-site scripting issues, an attacker must entice an
unsuspecting victim into visiting a malicious URI.


IV. DETECTION

Proof of concept:
http://example.com/index.php/"><script>alert('XSS')</script>


V. FIX

Properly validate user input.


VI. VENDOR RESPONSE

No vendor response at this time.


VII. CVE INFORMATION

No CVE at this time.


VIII. DISCLOSURE TIMELINE

21012008 Bug discovered
21012008 Vendor contacted


IX. CREDIT

Alessandro `jekil` Tanasi is credited with the discovery of this
vulnerability.
Login or Register to add favorites

File Archive:

September 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Sep 1st
    261 Files
  • 2
    Sep 2nd
    17 Files
  • 3
    Sep 3rd
    38 Files
  • 4
    Sep 4th
    52 Files
  • 5
    Sep 5th
    23 Files
  • 6
    Sep 6th
    27 Files
  • 7
    Sep 7th
    0 Files
  • 8
    Sep 8th
    1 Files
  • 9
    Sep 9th
    16 Files
  • 10
    Sep 10th
    38 Files
  • 11
    Sep 11th
    21 Files
  • 12
    Sep 12th
    40 Files
  • 13
    Sep 13th
    18 Files
  • 14
    Sep 14th
    0 Files
  • 15
    Sep 15th
    0 Files
  • 16
    Sep 16th
    0 Files
  • 17
    Sep 17th
    0 Files
  • 18
    Sep 18th
    0 Files
  • 19
    Sep 19th
    0 Files
  • 20
    Sep 20th
    0 Files
  • 21
    Sep 21st
    0 Files
  • 22
    Sep 22nd
    0 Files
  • 23
    Sep 23rd
    0 Files
  • 24
    Sep 24th
    0 Files
  • 25
    Sep 25th
    0 Files
  • 26
    Sep 26th
    0 Files
  • 27
    Sep 27th
    0 Files
  • 28
    Sep 28th
    0 Files
  • 29
    Sep 29th
    0 Files
  • 30
    Sep 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2024 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close