====================================================================== eTicket 1.5.5.2 Multiple Vulnerabilities ====================================================================== Author: L4teral Impact: Cross Site Scripting Cross Site Request Forgery SQL Injection Status: patch not available ------------------------------ Affected software description: ------------------------------ Application: eTicket Version: 1.5.5.2 (other versions may also be affected) Vendor: http://eticket.sourceforge.net Description: eTicket is a PHP-based electronic (open source) support ticket system based on osTicket, that can receive tickets via email (pop3/pipe) or a web form. It also offers a ticket manager with many features. An ideal helpdesk solution for any website. -------------- Vulnerability: -------------- 1. The variable 's' is not properly sanitized leading to cross site scripting. 2. The script admin.php is prone to sql injections (admin privileges required). 3. The search of the application is prone to sql injection, which can be used to obtain login credentials or perform other malicious taks. The parameters 'status', 'sort' and 'way' are not properly sanitized before being used in a sql query. Exploitation requires valid user credentials, but as any user is able to create a ticket, an attacker can obtain valid login data without any problems. 4. The application is vulnerable to cross site request forgery. Combined with the "my account" part of the application being prone to sql injection, the password of an admin account can be set to an arbitrary value by just visiting a specially crafted website wile being logged in to the application. Normally, the current password has to be entered to change the password of an account. This can be circumvented in the described way by combining the two vulnerabilities. ------------ PoC/Exploit: ------------ 1. http://localhost/eTicket/view.php?s="> 2. http://localhost/eTicket/admin.php?a=headers&msg=SQL' 3. http://localhost/eTicket/search.php?s=advanced&text=test&cat=&status=open'SQL&search_submit=Search 4. By visiting a page containing the following code, the password of a logged in administrator will be set to "hacked".








--------- Timeline: --------- 2007-11-19 - vendor informed The vendor responded, but after multiple attempts i did not get a statement whether these vulnerabilities will get fixed in a new version.