CVE-2017-15362

Source
https://nvd.nist.gov/vuln/detail/CVE-2017-15362
Import Source
https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2017-15362.json
JSON Data
https://api.osv.dev/v1/vulns/CVE-2017-15362
Published
2017-10-16T01:29:00Z
Modified
2025-02-19T02:20:25.579811Z
Severity
  • 6.1 (Medium) CVSS_V3 - CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N CVSS Calculator
Summary
[none]
Details

osTicket 1.10.1 allows arbitrary client-side JavaScript code execution on victims who click a crafted support/scp/tickets.php?status= link, aka XSS. Session ID and data theft may follow as well as the possibility of bypassing CSRF protections, injection of iframes to establish communication channels, etc. The vulnerability is present after login into the application. This affects a different tickets.php file than CVE-2015-1176.

References

Affected packages

Git / github.com/osticket/osticket-1.8

Affected ranges

Type
GIT
Repo
https://github.com/osticket/osticket-1.8
Events
Introduced
0 Unknown introduced commit / All previous commits are affected
Last affected

Affected versions

v1.*

v1.10
v1.10-dpr
v1.10-rc.1
v1.10-rc.2
v1.10-rc.3
v1.10.1
v1.8-dpr
v1.8.0
v1.8.0-rc1
v1.8.0-rc2
v1.8.0.1
v1.8.0.2
v1.8.0.3
v1.8.1
v1.8.1-dpr
v1.8.1-rc1
v1.8.1.1
v1.8.1.2
v1.8.2-dpr
v1.8.3
v1.8.4
v1.9-rc
v1.9.0
v1.9.1
v1.9.11
v1.9.12
v1.9.2
v1.9.3
v1.9.4
v1.9.4-dpr
v1.9.4-rc1
v1.9.4-rc2
v1.9.4-rc3
v1.9.4-rc4
v1.9.4-rc5
v1.9.5
v1.9.5.1
v1.9.6
v1.9.7
v1.9.8
v1.9.8.1
v1.9.9