Description
SQL injection vulnerability in scp/ajax.php in osTicket before 1.6.0 Stable allows remote authenticated users, with "Staff" permissions, to execute arbitrary SQL commands via the input parameter.
Exploits (1)
exploitdb
WORKING POC
VERIFIED
by Nahuel Grisolia · textwebappsphp
https://www.exploit-db.com/exploits/11380
References (5)
Core 5
Core References
Exploit exploit
x_refsource_exploit-db
http://www.exploit-db.com/exploits/11380
Exploit vdb-entry
x_refsource_bid
http://www.securityfocus.com/bid/38166
Exploit x_refsource_misc
http://packetstormsecurity.org/1002-exploits/osTicket-1.6-RC5-SQLi.pdf
Patch x_refsource_confirm
http://osticket.com/forums/project.php?issueid=176
Vendor Advisory third-party-advisory
x_refsource_secunia
http://secunia.com/advisories/38515
Scores
EPSS
0.0033
EPSS Percentile
55.6%
Details
CWE
CWE-89
Status
published
Products (5)
osticket/osticket
1
osticket/osticket
1.2.7
osticket/osticket
1.3.0
osticket/osticket
1.6 rc1 (4 CPE variants)
osticket/osticket
< 1.6
Published
Feb 11, 2010
Tracked Since
Feb 18, 2026