Family: CGI abuses --> Category: infos
osTicket setup.php Accessibility Vulnerability Scan
Vulnerability Scan Summary
Checks Accessibility of osTicket's setup.php
Detailed Explanation for this Vulnerability Test
The target is running at least one instance of an improperly secured
installation of osTicket and allows access to setup.php. Since that
script does not require authenticated access, it is possible for an
attacker to modify osTicket's configuration using a specially crafted
call to setup.php to perform the INSTALL actions.
For example, if config.php is writable, a possible hacker could change the
database used to store ticket information, even redirecting it to
another site. Alternatively, regardless of whether config.php is
writable, a possible hacker could cause the loss of all ticket information by
reinitializing the database given knowledge of its existing
configuration (gained, say, from reading config.php).
Solution : Remove both setup.php and gpcvar.php and ensure permissions
on config.php are 644.
Threat Level: Medium
Click HERE for more information and discussions on this network vulnerability scan.