-
Notifications
You must be signed in to change notification settings - Fork 2.7k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
CVE-2020-24881 - Server Side Request Forgery in OsTicket #11184
Comments
/bounty $50 |
💎 $50 bounty • ProjectDiscovery Bounty Available for CVE Template ContributionSteps to Contribute:
Thank you for contributing to projectdiscovery/nuclei-templates and helping us democratize security!
Add a bounty • Share on socials
|
/attempt #11184 Options |
/attempt #11184
|
Note The user @harshtech123 is already attempting to complete issue #11184 and claim the bounty. We recommend checking in on @harshtech123's progress, and potentially collaborating, before starting a new solution. |
💡 @hnd3884 submitted a pull request that claims the bounty. You can visit your bounty board to reward. |
@harshtech123: Reminder that in 4 days the bounty will become up for grabs, so please submit a pull request before then 🙏 |
Is there an existing template for this?
Template requests
Description:
SSRF vulnerability exists in osTicket before 1.14.3, allowing an attacker to add malicious files to the server or perform port scanning.
Severity:
Critical (CVSS: 9.8, Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H)
EPSS:
Details:
References:
Patch URLs:
Weaknesses:
Vulnerable CPE:
OSS:
Anything else?
No response
The text was updated successfully, but these errors were encountered: