Description
osTicket 1.10.1 allows arbitrary client-side JavaScript code execution on victims who click a crafted support/scp/tickets.php?status= link, aka XSS. Session ID and data theft may follow as well as the possibility of bypassing CSRF protections, injection of iframes to establish communication channels, etc. The vulnerability is present after login into the application. This affects a different tickets.php file than CVE-2015-1176.
Remediation
References
Related Vulnerabilities
WordPress Plugin Count per Day Cross-Site Request Forgery (3.2.5)
WebLogic CVE-2017-10137 Vulnerability (CVE-2017-10137)
WordPress 3.8.x Denial of Service Vulnerability (3.8 - 3.8.25)
WordPress Plugin MediaElement.js-HTML5 Video & Audio Player Cross-Site Scripting (4.2.8)
WordPress Plugin Be POPIA Compliant Information Disclosure (1.1.5)