Show plain JSON{"configurations": [{"nodes": [{"cpeMatch": [{"criteria": "cpe:2.3:a:osticket:osticket:1.10.1:*:*:*:*:*:*:*", "matchCriteriaId": "1FD9CB41-1BE8-4825-998E-9A204D5C2D35", "vulnerable": true}], "negate": false, "operator": "OR"}]}], "cveTags": [], "descriptions": [{"lang": "en", "value": "osTicket 1.10.1 allows arbitrary client-side JavaScript code execution on victims who click a crafted support/scp/tickets.php?status= link, aka XSS. Session ID and data theft may follow as well as the possibility of bypassing CSRF protections, injection of iframes to establish communication channels, etc. The vulnerability is present after login into the application. This affects a different tickets.php file than CVE-2015-1176."}, {"lang": "es", "value": "osTicket 1.10.1 permite la ejecuci\u00f3n de c\u00f3digo JavaScript arbitrario en el lado del cliente en v\u00edctimas que hagan clic en un enlace manipulado support/scp/tickets.php?status=, lo que tambi\u00e9n se conoce como Cross-Site Scripting (XSS). Como consecuencia, pueden tener lugar el robo de ID de sesi\u00f3n y de datos, as\u00ed como la posibilidad de que se omitan protecciones CSRF, la inyecci\u00f3n de iframes para establecer canales de comunicaci\u00f3n, etc. Esta vulnerabilidad est\u00e1 presente despu\u00e9s del inicio de sesi\u00f3n en la aplicaci\u00f3n. Esto afecta a un archivo tickets.php diferente de CVE-2015-1176."}], "id": "CVE-2017-15362", "lastModified": "2025-04-20T01:37:25.860", "metrics": {"cvssMetricV2": [{"acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": {"accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 4.3, "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", "version": "2.0"}, "exploitabilityScore": 8.6, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true}], "cvssMetricV30": [{"cvssData": {"attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.1, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", "version": "3.0"}, "exploitabilityScore": 2.8, "impactScore": 2.7, "source": "nvd@nist.gov", "type": "Primary"}]}, "published": "2017-10-16T01:29:00.997", "references": [{"source": "cve@mitre.org", "tags": ["Third Party Advisory"], "url": "https://becomepentester.blogspot.ae/2017/10/osTicket-XSS-CVE-2017-15362.html"}, {"source": "af854a3a-2127-422b-91ae-364da2661108", "tags": ["Third Party Advisory"], "url": "https://becomepentester.blogspot.ae/2017/10/osTicket-XSS-CVE-2017-15362.html"}], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Deferred", "weaknesses": [{"description": [{"lang": "en", "value": "CWE-79"}], "source": "nvd@nist.gov", "type": "Primary"}]}