All the vulnerabilites related to OTRS AG - ((OTRS)) Community Edition
cve-2020-1773
Vulnerability from cvelistv5
Published
2020-03-27 12:47
Modified
2024-09-16 23:27
Severity ?
EPSS score ?
Summary
Session / Password / Password token leak
References
Impacted products
Vendor | Product | Version | |||||
---|---|---|---|---|---|---|---|
▼ | OTRS AG | ((OTRS)) Community Edition |
Version: 5.0.41 and prior Version: 6.0.26 and prior |
||||
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T06:46:30.934Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://otrs.com/release-notes/otrs-security-advisory-2020-10/" }, { "name": "openSUSE-SU-2020:0551", "tags": [ "vendor-advisory", "x_transferred" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2020-04/msg00038.html" }, { "name": "openSUSE-SU-2020:1475", "tags": [ "vendor-advisory", "x_transferred" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00066.html" }, { "name": "openSUSE-SU-2020:1509", "tags": [ "vendor-advisory", "x_transferred" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00077.html" }, { "name": "[debian-lts-announce] 20230831 [SECURITY] [DLA 3551-1] otrs2 security update", "tags": [ "mailing-list", "x_transferred" ], "url": "https://lists.debian.org/debian-lts-announce/2023/08/msg00040.html" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "((OTRS)) Community Edition", "vendor": "OTRS AG", "versions": [ { "status": "affected", "version": "5.0.41 and prior" }, { "status": "affected", "version": "6.0.26 and prior" } ] }, { "product": "OTRS", "vendor": "OTRS AG", "versions": [ { "status": "affected", "version": "7.0.15 and prior" } ] } ], "credits": [ { "lang": "en", "value": "Fabian Henneke" } ], "datePublic": "2020-03-27T00:00:00", "descriptions": [ { "lang": "en", "value": "An attacker with the ability to generate session IDs or password reset tokens, either by being able to authenticate or by exploiting OSA-2020-09, may be able to predict other users session IDs, password reset tokens and automatically generated passwords. This issue affects ((OTRS)) Community Edition: 5.0.41 and prior versions, 6.0.26 and prior versions. OTRS; 7.0.15 and prior versions." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 7.3, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:N", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-331", "description": "CWE-331 Insufficient Entropy", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2023-08-31T02:06:15.836917", "orgId": "2e1bf29f-dc29-4ed8-830c-7b9348b6f0e8", "shortName": "OTRS" }, "references": [ { "url": "https://otrs.com/release-notes/otrs-security-advisory-2020-10/" }, { "name": "openSUSE-SU-2020:0551", "tags": [ "vendor-advisory" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2020-04/msg00038.html" }, { "name": "openSUSE-SU-2020:1475", "tags": [ "vendor-advisory" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00066.html" }, { "name": "openSUSE-SU-2020:1509", "tags": [ "vendor-advisory" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00077.html" }, { "name": "[debian-lts-announce] 20230831 [SECURITY] [DLA 3551-1] otrs2 security update", "tags": [ "mailing-list" ], "url": "https://lists.debian.org/debian-lts-announce/2023/08/msg00040.html" } ], "solutions": [ { "lang": "en", "value": "Upgrade to OTRS 7.0.16, ((OTRS)) Community Edition 6.0.27, 5.0.42\n\nPatch for ((OTRS)) Community Edition 6: https://github.com/OTRS/otrs/commit/ab253734bc211541309b9f8ea2b8b70389c4a64e\nPatch for ((OTRS)) Community Edition 5: https://github.com/OTRS/otrs/commit/4955521af50238046847bce51ad9865950324f77" } ], "source": { "advisory": "OSA-2020-10", "defect": [ "2020012742001563" ], "discovery": "EXTERNAL" }, "title": "Session / Password / Password token leak", "x_generator": { "engine": "Vulnogram 0.0.9" } } }, "cveMetadata": { "assignerOrgId": "2e1bf29f-dc29-4ed8-830c-7b9348b6f0e8", "assignerShortName": "OTRS", "cveId": "CVE-2020-1773", "datePublished": "2020-03-27T12:47:49.545851Z", "dateReserved": "2019-11-29T00:00:00", "dateUpdated": "2024-09-16T23:27:05.434Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2023-5422
Vulnerability from cvelistv5
Published
2023-10-16 08:10
Modified
2024-09-16 17:02
Severity ?
EPSS score ?
Summary
SSL Certificates are not checked for E-Mail Handling
References
Impacted products
Vendor | Product | Version | |||||
---|---|---|---|---|---|---|---|
▼ | OTRS AG | OTRS |
Version: 7.0.x Version: 8.0.x |
||||
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T07:59:44.689Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://otrs.com/release-notes/otrs-security-advisory-2023-10/" } ], "title": "CVE Program Container" }, { "affected": [ { "cpes": [ "cpe:2.3:a:otrs_ag:otrs:*:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "otrs", "vendor": "otrs_ag", "versions": [ { "lessThan": "7.0.47", "status": "affected", "version": "7.0.x", "versionType": "custom" }, { "lessThan": "8.0.37", "status": "affected", "version": "8.0.x", "versionType": "custom" } ] }, { "cpes": [ "cpe:2.3:a:otrs_community_edition:otrs_community_edition:*:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "otrs_community_edition", "vendor": "otrs_community_edition", "versions": [ { "lessThan": "6.0.34", "status": "affected", "version": "6.0x", "versionType": "custom" } ] } ], "metrics": [ { "other": { "content": { "id": "CVE-2023-5422", "options": [ { "Exploitation": "none" }, { "Automatable": "yes" }, { "Technical Impact": "total" } ], "role": "CISA Coordinator", "timestamp": "2024-09-16T16:57:40.338711Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-09-16T17:02:52.542Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "affected", "modules": [ "E-Mail Backend" ], "product": "OTRS", "vendor": "OTRS AG", "versions": [ { "lessThan": "7.0.47", "status": "affected", "version": "7.0.x", "versionType": "Patch" }, { "lessThan": "8.0.37", "status": "affected", "version": "8.0.x", "versionType": "Patch" } ] }, { "defaultStatus": "affected", "modules": [ "E-Mail Backend" ], "product": "((OTRS)) Community Edition", "vendor": "OTRS AG", "versions": [ { "lessThanOrEqual": "6.0.34", "status": "affected", "version": "6.0.x", "versionType": "All" } ] } ], "credits": [ { "lang": "en", "type": "reporter", "value": "Special thanks to Matthias Terlinde for reporting these vulnerability." } ], "datePublic": "2023-10-16T07:00:00.000Z", "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "\u003cdiv\u003eThe functions to fetch e-mail via POP3 or IMAP as well as sending e-mail via SMTP use OpenSSL for static SSL or TLS based communication. As the \nSSL_get_verify_result() function is not used the certificated is trusted always and it can not be ensured that the certificate \nsatisfies all necessary security requirements.\u003c/div\u003e\u003cdiv\u003e\u003cbr\u003e\u003c/div\u003e\u003cdiv\u003eThis could allow an \nattacker to use an invalid certificate to claim to be a trusted host, \nuse expired certificates, or conduct other attacks that could be \ndetected if the certificate is properly validated.\u003c/div\u003e\u003cdiv\u003e\u003cbr\u003e\u003c/div\u003e\u003cdiv\u003eThis issue affects OTRS: from 7.0.X before 7.0.47, from 8.0.X before 8.0.37; ((OTRS)) Community Edition: from 6.0.X through 6.0.34.\u003cbr\u003e\u003c/div\u003e\u003cdiv\u003e\u003cbr\u003e\u003c/div\u003e" } ], "value": "The functions to fetch e-mail via POP3 or IMAP as well as sending e-mail via SMTP use OpenSSL for static SSL or TLS based communication. As the \nSSL_get_verify_result() function is not used the certificated is trusted always and it can not be ensured that the certificate \nsatisfies all necessary security requirements.\n\nThis could allow an \nattacker to use an invalid certificate to claim to be a trusted host, \nuse expired certificates, or conduct other attacks that could be \ndetected if the certificate is properly validated.\n\nThis issue affects OTRS: from 7.0.X before 7.0.47, from 8.0.X before 8.0.37; ((OTRS)) Community Edition: from 6.0.X through 6.0.34.\n\n" } ], "impacts": [ { "capecId": "CAPEC-475", "descriptions": [ { "lang": "en", "value": "CAPEC-475 Signature Spoofing by Improper Validation" } ] } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 8.7, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:N", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-295", "description": "CWE-295 Improper Certificate Validation", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2023-10-16T08:10:35.192Z", "orgId": "2e1bf29f-dc29-4ed8-830c-7b9348b6f0e8", "shortName": "OTRS" }, "references": [ { "url": "https://otrs.com/release-notes/otrs-security-advisory-2023-10/" } ], "solutions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "\nUpdate to OTRS 7.0.47 or 8.0.37\n\u003cbr\u003e" } ], "value": "Update to OTRS 7.0.47 or 8.0.37\n\n" } ], "source": { "advisory": "OSA-2023-10", "defect": [ "Issue#21", "Issue#44", "Ticket#2022062142000679", "Ticket#2022061542000654" ], "discovery": "USER" }, "title": "SSL Certificates are not checked for E-Mail Handling", "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "2e1bf29f-dc29-4ed8-830c-7b9348b6f0e8", "assignerShortName": "OTRS", "cveId": "CVE-2023-5422", "datePublished": "2023-10-16T08:10:35.192Z", "dateReserved": "2023-10-05T08:12:18.101Z", "dateUpdated": "2024-09-16T17:02:52.542Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2020-1776
Vulnerability from cvelistv5
Published
2020-07-20 21:04
Modified
2024-09-17 00:26
Severity ?
EPSS score ?
Summary
Invalidating or changing user does not invalidate session
References
Impacted products
Vendor | Product | Version | |||||
---|---|---|---|---|---|---|---|
▼ | OTRS AG | ((OTRS)) Community Edition |
Version: 6.0.x < |
||||
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T06:46:30.918Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://otrs.com/release-notes/otrs-security-advisory-2020-13/" }, { "name": "[debian-lts-announce] 20230831 [SECURITY] [DLA 3551-1] otrs2 security update", "tags": [ "mailing-list", "x_transferred" ], "url": "https://lists.debian.org/debian-lts-announce/2023/08/msg00040.html" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "((OTRS)) Community Edition", "vendor": "OTRS AG", "versions": [ { "lessThanOrEqual": "6.0.28", "status": "affected", "version": "6.0.x", "versionType": "custom" } ] }, { "product": "OTRS", "vendor": "OTRS AG", "versions": [ { "lessThanOrEqual": "7.0.18", "status": "affected", "version": "7.0.x", "versionType": "custom" }, { "lessThanOrEqual": "8.0.4", "status": "affected", "version": "8.0.x", "versionType": "custom" } ] } ], "credits": [ { "lang": "en", "value": "Marvin Voormann" } ], "datePublic": "2020-07-20T00:00:00", "descriptions": [ { "lang": "en", "value": "When an agent user is renamed or set to invalid the session belonging to the user is keept active. The session can not be used to access ticket data in the case the agent is invalid. This issue affects ((OTRS)) Community Edition: 6.0.28 and prior versions. OTRS: 7.0.18 and prior versions, 8.0.4. and prior versions." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 3.5, "baseSeverity": "LOW", "confidentialityImpact": "LOW", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:L/I:N/A:N", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-613", "description": "CWE-613 Insufficient Session Expiration", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2023-08-31T02:07:12.227150", "orgId": "2e1bf29f-dc29-4ed8-830c-7b9348b6f0e8", "shortName": "OTRS" }, "references": [ { "url": "https://otrs.com/release-notes/otrs-security-advisory-2020-13/" }, { "name": "[debian-lts-announce] 20230831 [SECURITY] [DLA 3551-1] otrs2 security update", "tags": [ "mailing-list" ], "url": "https://lists.debian.org/debian-lts-announce/2023/08/msg00040.html" } ], "solutions": [ { "lang": "en", "value": "Upgrade to OTRS 8.0.5, OTRS 7.0.19, ((OTRS)) Community Edition 6.0.29\nPatch for ((OTRS)) Community Edition 6: https://github.com/OTRS/otrs/commit/4514f95f747be368c3dc9a9452ff9aa66506648d" } ], "source": { "advisory": "OSA-2020-13", "defect": [ "2020052042004084" ], "discovery": "INTERNAL" }, "title": "Invalidating or changing user does not invalidate session", "x_generator": { "engine": "Vulnogram 0.0.9" } } }, "cveMetadata": { "assignerOrgId": "2e1bf29f-dc29-4ed8-830c-7b9348b6f0e8", "assignerShortName": "OTRS", "cveId": "CVE-2020-1776", "datePublished": "2020-07-20T21:04:19.291845Z", "dateReserved": "2019-11-29T00:00:00", "dateUpdated": "2024-09-17T00:26:58.722Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2021-21440
Vulnerability from cvelistv5
Published
2021-07-26 04:25
Modified
2024-09-16 17:43
Severity ?
EPSS score ?
Summary
Support Bundle includes S/Mime and PGP keys
References
Impacted products
Vendor | Product | Version | |||||
---|---|---|---|---|---|---|---|
▼ | OTRS AG | ((OTRS)) Community Edition |
Version: 6.0.1 < 6.0.x* |
||||
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T18:16:22.320Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://otrs.com/release-notes/otrs-security-advisory-2021-10/" }, { "name": "[debian-lts-announce] 20230831 [SECURITY] [DLA 3551-1] otrs2 security update", "tags": [ "mailing-list", "x_transferred" ], "url": "https://lists.debian.org/debian-lts-announce/2023/08/msg00040.html" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "((OTRS)) Community Edition", "vendor": "OTRS AG", "versions": [ { "lessThan": "6.0.x*", "status": "affected", "version": "6.0.1", "versionType": "custom" } ] }, { "product": "OTRS", "vendor": "OTRS AG", "versions": [ { "lessThanOrEqual": "7.0.27", "status": "affected", "version": "7.0.x", "versionType": "custom" }, { "lessThanOrEqual": "8.0.14", "status": "affected", "version": "8.0.x", "versionType": "custom" } ] } ], "credits": [ { "lang": "en", "value": "Julian Droste" } ], "datePublic": "2021-07-26T00:00:00", "descriptions": [ { "lang": "en", "value": "Generated Support Bundles contains private S/MIME and PGP keys if containing folder is not hidden. This issue affects: OTRS AG ((OTRS)) Community Edition 6.0.x version 6.0.1 and later versions. OTRS AG OTRS 7.0.x version 7.0.27 and prior versions; 8.0.x version 8.0.14 and prior versions." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.2, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "LOW", "privilegesRequired": "HIGH", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:U/C:H/I:L/A:N", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-200", "description": "CWE-200 Information Exposure", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2023-08-31T02:06:58.211209", "orgId": "2e1bf29f-dc29-4ed8-830c-7b9348b6f0e8", "shortName": "OTRS" }, "references": [ { "url": "https://otrs.com/release-notes/otrs-security-advisory-2021-10/" }, { "name": "[debian-lts-announce] 20230831 [SECURITY] [DLA 3551-1] otrs2 security update", "tags": [ "mailing-list" ], "url": "https://lists.debian.org/debian-lts-announce/2023/08/msg00040.html" } ], "solutions": [ { "lang": "en", "value": "Update to OTRS 8.0.15 or OTRS 7.0.28." } ], "source": { "advisory": "OSA-2021-10", "defect": [ "2021050342000331" ], "discovery": "USER" }, "title": "Support Bundle includes S/Mime and PGP keys", "x_generator": { "engine": "Vulnogram 0.0.9" } } }, "cveMetadata": { "assignerOrgId": "2e1bf29f-dc29-4ed8-830c-7b9348b6f0e8", "assignerShortName": "OTRS", "cveId": "CVE-2021-21440", "datePublished": "2021-07-26T04:25:37.050952Z", "dateReserved": "2020-12-29T00:00:00", "dateUpdated": "2024-09-16T17:43:49.726Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2023-1250
Vulnerability from cvelistv5
Published
2023-03-20 08:20
Modified
2024-08-02 05:40
Severity ?
EPSS score ?
Summary
Code execution through ACL creation
References
Impacted products
Vendor | Product | Version | |||||
---|---|---|---|---|---|---|---|
▼ | OTRS AG | OTRS |
Version: 7.0.x Version: 8.0.x |
||||
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T05:40:59.714Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://otrs.com/release-notes/otrs-security-advisory-2023-02/" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "defaultStatus": "affected", "modules": [ "ACL" ], "product": "OTRS", "vendor": "OTRS AG", "versions": [ { "lessThan": "7.0.42", "status": "affected", "version": "7.0.x", "versionType": "Patch" }, { "lessThan": "8.0.31", "status": "affected", "version": "8.0.x", "versionType": "Patch" } ] }, { "defaultStatus": "affected", "modules": [ "ACL" ], "product": "((OTRS)) Community Edition", "vendor": "OTRS AG", "versions": [ { "lessThanOrEqual": "6.0.34", "status": "affected", "version": "6.0.1", "versionType": "All" } ] } ], "credits": [ { "lang": "en", "type": "finder", "user": "00000000-0000-4000-9000-000000000000", "value": "Special thanks to Tim P\u00fcttmanns for reporting these vulnerability." } ], "datePublic": "2023-03-20T07:00:00.000Z", "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "Improper Input Validation vulnerability in OTRS AG OTRS (ACL modules), OTRS AG ((OTRS)) Community Edition (ACL modules) allows Local Execution of Code. When creating/importing an ACL it was possible to inject code that gets executed via manipulated comments and ACL-names\u003cbr\u003e\u003cp\u003eThis issue affects OTRS: from 7.0.X before 7.0.42, from 8.0.X before 8.0.31; ((OTRS)) Community Edition: from 6.0.1 through 6.0.34.\u003c/p\u003e" } ], "value": "Improper Input Validation vulnerability in OTRS AG OTRS (ACL modules), OTRS AG ((OTRS)) Community Edition (ACL modules) allows Local Execution of Code. When creating/importing an ACL it was possible to inject code that gets executed via manipulated comments and ACL-names\nThis issue affects OTRS: from 7.0.X before 7.0.42, from 8.0.X before 8.0.31; ((OTRS)) Community Edition: from 6.0.1 through 6.0.34.\n\n" } ], "impacts": [ { "capecId": "CAPEC-549", "descriptions": [ { "lang": "en", "value": "CAPEC-549 Local Execution of Code" } ] } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "NONE", "baseScore": 7.4, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "HIGH", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:R/S:C/C:H/I:H/A:N", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-20", "description": "CWE-20 Improper Input Validation", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2023-03-20T08:20:39.331Z", "orgId": "2e1bf29f-dc29-4ed8-830c-7b9348b6f0e8", "shortName": "OTRS" }, "references": [ { "url": "https://otrs.com/release-notes/otrs-security-advisory-2023-02/" } ], "solutions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "\u003cp\u003eUpdate to OTRS 7.0.42, OTRS 8.0.31\u003c/p\u003e" } ], "value": "Update to OTRS 7.0.42, OTRS 8.0.31\n\n" } ], "source": { "advisory": "OSA-2023-02", "defect": [ "356", "2022121942001554" ], "discovery": "EXTERNAL" }, "title": "Code execution through ACL creation", "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "2e1bf29f-dc29-4ed8-830c-7b9348b6f0e8", "assignerShortName": "OTRS", "cveId": "CVE-2023-1250", "datePublished": "2023-03-20T08:20:39.331Z", "dateReserved": "2023-03-07T09:36:16.027Z", "dateUpdated": "2024-08-02T05:40:59.714Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2021-21443
Vulnerability from cvelistv5
Published
2021-07-26 04:25
Modified
2024-09-16 20:11
Severity ?
EPSS score ?
Summary
Unautorized listing of the customer user emails
References
Impacted products
Vendor | Product | Version | |||||
---|---|---|---|---|---|---|---|
▼ | OTRS AG | ((OTRS)) Community Edition |
Version: 6.0.1 < 6.0.x* |
||||
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T18:16:22.416Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://otrs.com/release-notes/otrs-security-advisory-2021-13/" }, { "name": "[debian-lts-announce] 20230831 [SECURITY] [DLA 3551-1] otrs2 security update", "tags": [ "mailing-list", "x_transferred" ], "url": "https://lists.debian.org/debian-lts-announce/2023/08/msg00040.html" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "((OTRS)) Community Edition", "vendor": "OTRS AG", "versions": [ { "lessThan": "6.0.x*", "status": "affected", "version": "6.0.1", "versionType": "custom" } ] }, { "product": "OTRS", "vendor": "OTRS AG", "versions": [ { "lessThan": "7.0.27", "status": "affected", "version": "7.0.x", "versionType": "custom" } ] } ], "datePublic": "2021-07-26T00:00:00", "descriptions": [ { "lang": "en", "value": "Agents are able to list customer user emails without required permissions in the bulk action screen. This issue affects: OTRS AG ((OTRS)) Community Edition: 6.0.x version 6.0.1 and later versions. OTRS AG OTRS: 7.0.x versions prior to 7.0.27." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 3.5, "baseSeverity": "LOW", "confidentialityImpact": "LOW", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:L/I:N/A:N", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-200", "description": "CWE-200 Information Exposure", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2023-08-31T02:06:56.804777", "orgId": "2e1bf29f-dc29-4ed8-830c-7b9348b6f0e8", "shortName": "OTRS" }, "references": [ { "url": "https://otrs.com/release-notes/otrs-security-advisory-2021-13/" }, { "name": "[debian-lts-announce] 20230831 [SECURITY] [DLA 3551-1] otrs2 security update", "tags": [ "mailing-list" ], "url": "https://lists.debian.org/debian-lts-announce/2023/08/msg00040.html" } ], "solutions": [ { "lang": "en", "value": "Update to OTRS 7.0.28." } ], "source": { "advisory": "OSA-2021-13", "defect": [ "2021062442001361" ], "discovery": "USER" }, "title": "Unautorized listing of the customer user emails", "x_generator": { "engine": "Vulnogram 0.0.9" } } }, "cveMetadata": { "assignerOrgId": "2e1bf29f-dc29-4ed8-830c-7b9348b6f0e8", "assignerShortName": "OTRS", "cveId": "CVE-2021-21443", "datePublished": "2021-07-26T04:25:40.249893Z", "dateReserved": "2020-12-29T00:00:00", "dateUpdated": "2024-09-16T20:11:31.892Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2023-38059
Vulnerability from cvelistv5
Published
2023-10-16 08:10
Modified
2024-09-16 16:56
Severity ?
EPSS score ?
Summary
External pictures can be loaded even if not allowed by configuration
References
Impacted products
Vendor | Product | Version | |||||
---|---|---|---|---|---|---|---|
▼ | OTRS AG | OTRS |
Version: 7.0.x Version: 8.0.x |
||||
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T17:30:13.552Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://otrs.com/release-notes/otrs-security-advisory-2023-08/" } ], "title": "CVE Program Container" }, { "metrics": [ { "other": { "content": { "id": "CVE-2023-38059", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-09-16T16:56:02.147025Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-09-16T16:56:26.630Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "affected", "modules": [ "Agent Interface" ], "product": "OTRS", "vendor": "OTRS AG", "versions": [ { "lessThan": "7.0.47", "status": "affected", "version": "7.0.x", "versionType": "Patch" }, { "lessThan": "8.0.37", "status": "affected", "version": "8.0.x", "versionType": "Patch" } ] }, { "defaultStatus": "unaffected", "modules": [ "Agent Interface" ], "product": "((OTRS)) Community Edition", "vendor": "OTRS AG", "versions": [ { "lessThanOrEqual": "6.0.34", "status": "affected", "version": "6.0.x", "versionType": "All" } ] } ], "credits": [ { "lang": "en", "type": "finder", "value": "Special thanks to Tim P\u00fcttmanns for reporting these vulnerability." } ], "datePublic": "2023-10-16T07:00:00.000Z", "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "The loading of external images is not blocked, even if configured, if the attacker uses protocol-relative URL in the payload. This can be used to retreive the IP of the user.\u003cp\u003eThis issue affects OTRS: from 7.0.X before 7.0.47, from 8.0.X before 8.0.37; ((OTRS)) Community Edition: from 6.0.X through 6.0.34.\u003c/p\u003e" } ], "value": "The loading of external images is not blocked, even if configured, if the attacker uses protocol-relative URL in the payload. This can be used to retreive the IP of the user.This issue affects OTRS: from 7.0.X before 7.0.47, from 8.0.X before 8.0.37; ((OTRS)) Community Edition: from 6.0.X through 6.0.34.\n\n" } ], "impacts": [ { "capecId": "CAPEC-37", "descriptions": [ { "lang": "en", "value": "CAPEC-37 Retrieve Embedded Sensitive Data" } ] } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-200", "description": "CWE-200 Exposure of Sensitive Information to an Unauthorized Actor", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2023-10-16T08:10:44.014Z", "orgId": "2e1bf29f-dc29-4ed8-830c-7b9348b6f0e8", "shortName": "OTRS" }, "references": [ { "url": "https://otrs.com/release-notes/otrs-security-advisory-2023-08/" } ], "solutions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "Update to OTRS 8.0.37 or OTRS 7.0.47\u003cbr\u003e" } ], "value": "Update to OTRS 8.0.37 or OTRS 7.0.47\n" } ], "source": { "advisory": "OSA-2023-08", "defect": [ "Issue#1185", "Ticket#2023041342000623" ], "discovery": "EXTERNAL" }, "title": "External pictures can be loaded even if not allowed by configuration", "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "2e1bf29f-dc29-4ed8-830c-7b9348b6f0e8", "assignerShortName": "OTRS", "cveId": "CVE-2023-38059", "datePublished": "2023-10-16T08:10:44.014Z", "dateReserved": "2023-07-12T08:05:38.780Z", "dateUpdated": "2024-09-16T16:56:26.630Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2020-1767
Vulnerability from cvelistv5
Published
2020-01-10 15:09
Modified
2024-09-16 16:33
Severity ?
EPSS score ?
Summary
Possible to send drafted messages as wrong agent
References
Impacted products
Vendor | Product | Version | |||||
---|---|---|---|---|---|---|---|
▼ | OTRS AG | ((OTRS)) Community Edition |
Version: 6.0.x version 6.0.24 and prior versions |
||||
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T06:46:30.861Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://otrs.com/release-notes/otrs-security-advisory-2020-03/" }, { "name": "[debian-lts-announce] 20200129 [SECURITY] [DLA 2079-1] otrs2 security update", "tags": [ "mailing-list", "x_transferred" ], "url": "https://lists.debian.org/debian-lts-announce/2020/01/msg00027.html" }, { "name": "[debian-lts-announce] 20230831 [SECURITY] [DLA 3551-1] otrs2 security update", "tags": [ "mailing-list", "x_transferred" ], "url": "https://lists.debian.org/debian-lts-announce/2023/08/msg00040.html" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "((OTRS)) Community Edition", "vendor": "OTRS AG", "versions": [ { "status": "affected", "version": "6.0.x version 6.0.24 and prior versions" } ] }, { "product": "OTRS", "vendor": "OTRS AG", "versions": [ { "status": "affected", "version": "7.0.x version 7.0.13 and prior versions" } ] } ], "datePublic": "2020-01-10T00:00:00", "descriptions": [ { "lang": "en", "value": "Agent A is able to save a draft (i.e. for customer reply). Then Agent B can open the draft, change the text completely and send it in the name of Agent A. For the customer it will not be visible that the message was sent by another agent. This issue affects: ((OTRS)) Community Edition 6.0.x version 6.0.24 and prior versions. OTRS 7.0.x version 7.0.13 and prior versions." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 3.5, "baseSeverity": "LOW", "confidentialityImpact": "NONE", "integrityImpact": "LOW", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:L/A:N", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "description": "Sender spoofing", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2023-08-31T02:07:04.665672", "orgId": "2e1bf29f-dc29-4ed8-830c-7b9348b6f0e8", "shortName": "OTRS" }, "references": [ { "url": "https://otrs.com/release-notes/otrs-security-advisory-2020-03/" }, { "name": "[debian-lts-announce] 20200129 [SECURITY] [DLA 2079-1] otrs2 security update", "tags": [ "mailing-list" ], "url": "https://lists.debian.org/debian-lts-announce/2020/01/msg00027.html" }, { "name": "[debian-lts-announce] 20230831 [SECURITY] [DLA 3551-1] otrs2 security update", "tags": [ "mailing-list" ], "url": "https://lists.debian.org/debian-lts-announce/2023/08/msg00040.html" } ], "solutions": [ { "lang": "en", "value": "Upgrade to OTRS 7.0.14, ((OTRS)) Community Edition 6.0.25" }, { "lang": "en", "value": "Patch for ((OTRS)) Community Edition 6: https://github.com/OTRS/otrs/commit/5f488fd6c809064ee49def3a432030258d211570" } ], "source": { "advisory": "OSA-2020-03", "defect": [ "2019121042000738" ], "discovery": "USER" }, "title": "Possible to send drafted messages as wrong agent", "x_generator": { "engine": "Vulnogram 0.0.9" } } }, "cveMetadata": { "assignerOrgId": "2e1bf29f-dc29-4ed8-830c-7b9348b6f0e8", "assignerShortName": "OTRS", "cveId": "CVE-2020-1767", "datePublished": "2020-01-10T15:09:00.608111Z", "dateReserved": "2019-11-29T00:00:00", "dateUpdated": "2024-09-16T16:33:51.552Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2023-5421
Vulnerability from cvelistv5
Published
2023-10-16 08:10
Modified
2024-09-16 16:55
Severity ?
EPSS score ?
Summary
Possible XSS execution in customer information
References
Impacted products
Vendor | Product | Version | |||||
---|---|---|---|---|---|---|---|
▼ | OTRS AG | OTRS |
Version: 7.0.x Version: 8.0.x |
||||
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T07:59:44.593Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://otrs.com/release-notes/otrs-security-advisory-2023-09/" } ], "title": "CVE Program Container" }, { "metrics": [ { "other": { "content": { "id": "CVE-2023-5421", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-09-16T16:53:50.683230Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-09-16T16:55:01.099Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "affected", "modules": [ "Agent Interface" ], "product": "OTRS", "vendor": "OTRS AG", "versions": [ { "lessThan": "7.0.47", "status": "affected", "version": "7.0.x", "versionType": "Patch" }, { "lessThan": "8.0.37", "status": "affected", "version": "8.0.x", "versionType": "Patch" } ] }, { "defaultStatus": "affected", "modules": [ "Agent Interface" ], "product": "((OTRS)) Community Edition", "vendor": "OTRS AG", "versions": [ { "lessThanOrEqual": "6.0.34", "status": "affected", "version": "6.0.x", "versionType": "All" } ] } ], "credits": [ { "lang": "en", "type": "finder", "value": "Special thanks to Tim P\u00fcttmanns for reporting these vulnerability." } ], "datePublic": "2023-10-16T07:00:00.000Z", "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "An attacker who is logged into OTRS as an user with privileges to create and change customer user data may manipulate the CustomerID field to execute JavaScript code that runs \nimmediatly after the data is saved.The issue onlyoccurs if the configuration for AdminCustomerUser::UseAutoComplete was changed before.\u003cbr\u003e\u003cp\u003eThis issue affects OTRS: from 7.0.X before 7.0.47, from 8.0.X before 8.0.37; ((OTRS)) Community Edition: from 6.0.X through 6.0.34.\u003c/p\u003e" } ], "value": "An attacker who is logged into OTRS as an user with privileges to create and change customer user data may manipulate the CustomerID field to execute JavaScript code that runs \nimmediatly after the data is saved.The issue onlyoccurs if the configuration for AdminCustomerUser::UseAutoComplete was changed before.\nThis issue affects OTRS: from 7.0.X before 7.0.47, from 8.0.X before 8.0.37; ((OTRS)) Community Edition: from 6.0.X through 6.0.34.\n\n" } ], "impacts": [ { "capecId": "CAPEC-63", "descriptions": [ { "lang": "en", "value": "CAPEC-63 Cross-Site Scripting (XSS)" } ] } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "ADJACENT_NETWORK", "availabilityImpact": "NONE", "baseScore": 3.5, "baseSeverity": "LOW", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "HIGH", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:A/AC:L/PR:H/UI:N/S:U/C:L/I:L/A:N", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-20", "description": "CWE-20 Improper Input Validation", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2023-10-16T08:10:55.114Z", "orgId": "2e1bf29f-dc29-4ed8-830c-7b9348b6f0e8", "shortName": "OTRS" }, "references": [ { "url": "https://otrs.com/release-notes/otrs-security-advisory-2023-09/" } ], "solutions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "\nUpdate to OTRS 7.0.47 or OTRS 8.0.37.\n\u003cbr\u003e" } ], "value": "Update to OTRS 7.0.47 or OTRS 8.0.37.\n\n" } ], "source": { "advisory": "OSA-2023-09", "defect": [ "Issue#1214", "Ticket#2023080742002233" ], "discovery": "EXTERNAL" }, "title": " Possible XSS execution in customer information ", "workarounds": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "Switch AdminCustomerUser::UseAutoComplete off\u003cbr\u003e" } ], "value": "Switch AdminCustomerUser::UseAutoComplete off\n" } ], "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "2e1bf29f-dc29-4ed8-830c-7b9348b6f0e8", "assignerShortName": "OTRS", "cveId": "CVE-2023-5421", "datePublished": "2023-10-16T08:10:55.114Z", "dateReserved": "2023-10-05T08:12:09.849Z", "dateUpdated": "2024-09-16T16:55:01.099Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2021-36095
Vulnerability from cvelistv5
Published
2021-09-06 13:15
Modified
2024-09-16 17:58
Severity ?
EPSS score ?
Summary
User enumeration issue using "lost password" feature
References
▼ | URL | Tags |
---|---|---|
https://otrs.com/release-notes/otrs-security-advisory-2021-18/ | x_refsource_CONFIRM |
Impacted products
Vendor | Product | Version | |||||
---|---|---|---|---|---|---|---|
▼ | OTRS AG | ((OTRS)) Community Edition |
Version: 6.0.1 < unspecified |
||||
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T00:47:43.852Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://otrs.com/release-notes/otrs-security-advisory-2021-18/" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "((OTRS)) Community Edition", "vendor": "OTRS AG", "versions": [ { "lessThan": "unspecified", "status": "affected", "version": "6.0.1", "versionType": "custom" } ] }, { "product": "OTRS", "vendor": "OTRS AG", "versions": [ { "lessThanOrEqual": "7.0.28", "status": "affected", "version": "7.0.x", "versionType": "custom" } ] } ], "datePublic": "2021-09-06T00:00:00", "descriptions": [ { "lang": "en", "value": "Malicious attacker is able to find out valid user logins by using the \"lost password\" feature. This issue affects: OTRS AG ((OTRS)) Community Edition version 6.0.1 and later versions. OTRS AG OTRS 7.0.x version 7.0.28 and prior versions." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-200", "description": "CWE-200 Information Exposure", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2021-09-06T13:15:27", "orgId": "2e1bf29f-dc29-4ed8-830c-7b9348b6f0e8", "shortName": "OTRS" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "https://otrs.com/release-notes/otrs-security-advisory-2021-18/" } ], "solutions": [ { "lang": "en", "value": "Update to OTRS 7.0.29." } ], "source": { "advisory": "OSA-2021-18", "defect": [ "2021062442001389" ], "discovery": "USER" }, "title": "User enumeration issue using \"lost password\" feature", "x_generator": { "engine": "Vulnogram 0.0.9" }, "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "security@otrs.com", "DATE_PUBLIC": "2021-09-06T00:00:00.000Z", "ID": "CVE-2021-36095", "STATE": "PUBLIC", "TITLE": "User enumeration issue using \"lost password\" feature" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "((OTRS)) Community Edition", "version": { "version_data": [ { "version_affected": "\u003e=", "version_value": "6.0.1" } ] } }, { "product_name": "OTRS", "version": { "version_data": [ { "version_affected": "\u003c=", "version_name": "7.0.x", "version_value": "7.0.28" } ] } } ] }, "vendor_name": "OTRS AG" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Malicious attacker is able to find out valid user logins by using the \"lost password\" feature. This issue affects: OTRS AG ((OTRS)) Community Edition version 6.0.1 and later versions. OTRS AG OTRS 7.0.x version 7.0.28 and prior versions." } ] }, "generator": { "engine": "Vulnogram 0.0.9" }, "impact": { "cvss": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N", "version": "3.1" } }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "CWE-200 Information Exposure" } ] } ] }, "references": { "reference_data": [ { "name": "https://otrs.com/release-notes/otrs-security-advisory-2021-18/", "refsource": "CONFIRM", "url": "https://otrs.com/release-notes/otrs-security-advisory-2021-18/" } ] }, "solution": [ { "lang": "en", "value": "Update to OTRS 7.0.29." } ], "source": { "advisory": "OSA-2021-18", "defect": [ "2021062442001389" ], "discovery": "USER" } } } }, "cveMetadata": { "assignerOrgId": "2e1bf29f-dc29-4ed8-830c-7b9348b6f0e8", "assignerShortName": "OTRS", "cveId": "CVE-2021-36095", "datePublished": "2021-09-06T13:15:27.220553Z", "dateReserved": "2021-07-01T00:00:00", "dateUpdated": "2024-09-16T17:58:45.926Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2021-36100
Vulnerability from cvelistv5
Published
2022-03-21 09:15
Modified
2024-09-17 02:00
Severity ?
EPSS score ?
Summary
Authenticated remote code execution
References
Impacted products
Vendor | Product | Version | |||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
▼ | OTRS AG | OTRS |
Version: 8.0.x < Version: 7.0.x < |
||||||||||||
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T00:47:43.893Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://otrs.com/release-notes/otrs-security-advisory-2022-03/" }, { "name": "[debian-lts-announce] 20230831 [SECURITY] [DLA 3551-1] otrs2 security update", "tags": [ "mailing-list", "x_transferred" ], "url": "https://lists.debian.org/debian-lts-announce/2023/08/msg00040.html" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "OTRS", "vendor": "OTRS AG", "versions": [ { "lessThanOrEqual": "8.0.19", "status": "affected", "version": "8.0.x", "versionType": "custom" }, { "lessThanOrEqual": "7.0.32", "status": "affected", "version": "7.0.x", "versionType": "custom" } ] }, { "product": "SystemMonitoring", "vendor": "OTRS AG", "versions": [ { "lessThanOrEqual": "7.0.18", "status": "affected", "version": "7.0.x", "versionType": "custom" }, { "lessThanOrEqual": "8.0.8", "status": "affected", "version": "8.0.x", "versionType": "custom" }, { "lessThan": "6.0.x*", "status": "affected", "version": "6.0.1", "versionType": "custom" } ] }, { "product": "OTRSSTORM", "vendor": "OTRS AG", "versions": [ { "lessThanOrEqual": "7.0.27", "status": "affected", "version": "7.0.x", "versionType": "custom" }, { "lessThanOrEqual": "8.0.11", "status": "affected", "version": "8.0.x", "versionType": "custom" }, { "lessThan": "6.0.x*", "status": "affected", "version": "6.0.1", "versionType": "custom" } ] }, { "product": "((OTRS)) Community Edition", "vendor": "OTRS AG", "versions": [ { "lessThan": "6.0.x*", "status": "affected", "version": "6.0.1", "versionType": "custom" } ] } ], "credits": [ { "lang": "en", "value": "Special thanks to Rayhan Ahmed and Maxime Brigaudeau for reporting these vulnerability." } ], "datePublic": "2022-03-21T00:00:00", "descriptions": [ { "lang": "en", "value": "Specially crafted string in OTRS system configuration can allow the execution of any system command." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 6.4, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "HIGH", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:H/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "description": "rce", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2023-08-31T02:07:07.668759", "orgId": "2e1bf29f-dc29-4ed8-830c-7b9348b6f0e8", "shortName": "OTRS" }, "references": [ { "url": "https://otrs.com/release-notes/otrs-security-advisory-2022-03/" }, { "name": "[debian-lts-announce] 20230831 [SECURITY] [DLA 3551-1] otrs2 security update", "tags": [ "mailing-list" ], "url": "https://lists.debian.org/debian-lts-announce/2023/08/msg00040.html" } ], "solutions": [ { "lang": "en", "value": "Update to OTRS 8.0.20, OTRS 7.0.33. Update to OTRSSTORM 8.0.12, OTRS 7.0.28. Update to SystemMonitoring 8.0.9, OTRS 7.0.19." } ], "source": { "advisory": "OSA-2022-03", "defect": [ "2020093042003988", "2020090442000735", "2021102242000358" ], "discovery": "USER" }, "title": "Authenticated remote code execution", "x_generator": { "engine": "Vulnogram 0.0.9" } } }, "cveMetadata": { "assignerOrgId": "2e1bf29f-dc29-4ed8-830c-7b9348b6f0e8", "assignerShortName": "OTRS", "cveId": "CVE-2021-36100", "datePublished": "2022-03-21T09:15:24.697180Z", "dateReserved": "2021-07-01T00:00:00", "dateUpdated": "2024-09-17T02:00:46.987Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2024-43444
Vulnerability from cvelistv5
Published
2024-08-26 08:42
Modified
2024-08-29 07:36
Severity ?
EPSS score ?
Summary
Passwords are written to Admin Log Module
References
Impacted products
Vendor | Product | Version | |||||
---|---|---|---|---|---|---|---|
▼ | OTRS AG | OTRS |
Version: 7.0.x Version: 8.0.x Version: 2023.x Version: 2024.x |
||||
|
{ "containers": { "adp": [ { "affected": [ { "cpes": [ "cpe:2.3:a:otrs:otrs:*:*:*:*:*:*:*:*" ], "defaultStatus": "unaffected", "product": "otrs", "vendor": "otrs", "versions": [ { "lessThanOrEqual": "7.0.50", "status": "affected", "version": "7.0.0", "versionType": "custom" }, { "status": "affected", "version": "8.0.0" }, { "status": "affected", "version": "2023.0" }, { "lessThanOrEqual": "2024.5.0", "status": "affected", "version": "2024.0", "versionType": "custom" } ] }, { "cpes": [ "cpe:2.3:a:otrs:otrs:*:*:*:*:community:*:*:*" ], "defaultStatus": "affected", "product": "otrs", "vendor": "otrs", "versions": [ { "status": "affected", "version": "6.0.0" } ] } ], "metrics": [ { "other": { "content": { "id": "CVE-2024-43444", "options": [ { "Exploitation": "none" }, { "Automatable": "yes" }, { "Technical Impact": "total" } ], "role": "CISA Coordinator", "timestamp": "2024-08-26T13:57:06.436622Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-08-26T14:01:52.566Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "affected", "modules": [ "Log Module", "Agent Authentication", "Customer Authentication" ], "product": "OTRS", "vendor": "OTRS AG", "versions": [ { "lessThanOrEqual": "7.0.50", "status": "affected", "version": "7.0.x", "versionType": "Patch" }, { "status": "affected", "version": "8.0.x" }, { "status": "affected", "version": "2023.x" }, { "lessThanOrEqual": "2024.5.x", "status": "affected", "version": "2024.x", "versionType": "Patch" } ] }, { "defaultStatus": "affected", "modules": [ "Log Module", "Agent Authentication", "Customer Authentication" ], "product": "((OTRS)) Community Edition", "vendor": "OTRS AG", "versions": [ { "status": "affected", "version": "6.0.x" } ] } ], "datePublic": "2024-08-26T08:00:00.000Z", "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "\u003cdiv\u003ePasswords of agents and customers are displayed in plain text in the OTRS admin log module if certain configurations regarding the authentication sources match and debugging for the authentication backend has been enabled.\u003cbr\u003e\u003c/div\u003e\u003cdiv\u003e\u003cp\u003eThis issue affects: \u003c/p\u003e\u003cul\u003e\u003cli\u003eOTRS from 7.0.X through 7.0.50\u003c/li\u003e\u003cli\u003eOTRS 8.0.X\u003c/li\u003e\u003cli\u003eOTRS 2023.X\u003c/li\u003e\u003cli\u003eOTRS from 2024.X through 2024.5.X\u003c/li\u003e\u003cli\u003e((OTRS)) Community Edition: 6.0.x\u003cbr\u003e\u003c/li\u003e\u003c/ul\u003e\u003cdiv\u003eProducts based on the ((OTRS)) Community Edition also very likely to be affected\u003c/div\u003e\u003cbr\u003e\u003c/div\u003e" } ], "value": "Passwords of agents and customers are displayed in plain text in the OTRS admin log module if certain configurations regarding the authentication sources match and debugging for the authentication backend has been enabled.\n\nThis issue affects: \n\n * OTRS from 7.0.X through 7.0.50\n * OTRS 8.0.X\n * OTRS 2023.X\n * OTRS from 2024.X through 2024.5.X\n * ((OTRS)) Community Edition: 6.0.x\n\nProducts based on the ((OTRS)) Community Edition also very likely to be affected" } ], "impacts": [ { "capecId": "CAPEC-545", "descriptions": [ { "lang": "en", "value": "CAPEC-545 Pull Data from System Resources" } ] } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 8.2, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:L/A:N", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-532", "description": "CWE-532 Insertion of Sensitive Information into Log File", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-08-29T07:36:13.555Z", "orgId": "2e1bf29f-dc29-4ed8-830c-7b9348b6f0e8", "shortName": "OTRS" }, "references": [ { "url": "https://otrs.com/release-notes/otrs-security-advisory-2024-12/" } ], "solutions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "Update to OTRS 2024.6.x or OTRS 7.0.51\u003cbr\u003e" } ], "value": "Update to OTRS 2024.6.x or OTRS 7.0.51" } ], "source": { "advisory": "OSA-2024-12", "defect": [ "Issue#2725", "Ticket#2024072442001041", "Ticket#2024072442000677" ], "discovery": "USER" }, "title": "Passwords are written to Admin Log Module", "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "2e1bf29f-dc29-4ed8-830c-7b9348b6f0e8", "assignerShortName": "OTRS", "cveId": "CVE-2024-43444", "datePublished": "2024-08-26T08:42:58.796Z", "dateReserved": "2024-08-13T13:38:47.973Z", "dateUpdated": "2024-08-29T07:36:13.555Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2021-36093
Vulnerability from cvelistv5
Published
2021-09-06 13:15
Modified
2024-09-16 20:36
Severity ?
EPSS score ?
Summary
DoS attack using PostMaster filters
References
▼ | URL | Tags |
---|---|---|
https://otrs.com/release-notes/otrs-security-advisory-2021-16/ | x_refsource_CONFIRM |
Impacted products
Vendor | Product | Version | |||||
---|---|---|---|---|---|---|---|
▼ | OTRS AG | ((OTRS)) Community Edition |
Version: 6.0.1 < 6.0.x* |
||||
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T00:47:43.937Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://otrs.com/release-notes/otrs-security-advisory-2021-16/" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "((OTRS)) Community Edition", "vendor": "OTRS AG", "versions": [ { "lessThan": "6.0.x*", "status": "affected", "version": "6.0.1", "versionType": "custom" } ] }, { "product": "OTRS", "vendor": "OTRS AG", "versions": [ { "lessThanOrEqual": "7.0.28", "status": "affected", "version": "7.0.x", "versionType": "custom" }, { "lessThanOrEqual": "8.0.15", "status": "affected", "version": "8.0.x", "versionType": "custom" } ] } ], "credits": [ { "lang": "en", "value": "Alberto Molina" } ], "datePublic": "2021-09-06T00:00:00", "descriptions": [ { "lang": "en", "value": "It\u0027s possible to create an email which can be stuck while being processed by PostMaster filters, causing DoS. This issue affects: OTRS AG ((OTRS)) Community Edition 6.0.x version 6.0.1 and later versions. OTRS AG OTRS 7.0.x version 7.0.28 and prior versions; 8.0.x version 8.0.15 and prior versions." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "LOW", "baseScore": 5.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-185", "description": "CWE-185 Incorrect Regular Expression", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2021-09-06T13:15:23", "orgId": "2e1bf29f-dc29-4ed8-830c-7b9348b6f0e8", "shortName": "OTRS" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "https://otrs.com/release-notes/otrs-security-advisory-2021-16/" } ], "solutions": [ { "lang": "en", "value": "Update to OTRS 8.0.16, OTRS 7.0.29." } ], "source": { "advisory": "OSA-2021-16", "defect": [ "2021070842000819" ], "discovery": "USER" }, "title": "DoS attack using PostMaster filters", "x_generator": { "engine": "Vulnogram 0.0.9" }, "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "security@otrs.com", "DATE_PUBLIC": "2021-09-06T00:00:00.000Z", "ID": "CVE-2021-36093", "STATE": "PUBLIC", "TITLE": "DoS attack using PostMaster filters" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "((OTRS)) Community Edition", "version": { "version_data": [ { "version_affected": "\u003e=", "version_name": "6.0.x", "version_value": "6.0.1" } ] } }, { "product_name": "OTRS", "version": { "version_data": [ { "version_affected": "\u003c=", "version_name": "7.0.x", "version_value": "7.0.28" }, { "version_affected": "\u003c=", "version_name": "8.0.x", "version_value": "8.0.15" } ] } } ] }, "vendor_name": "OTRS AG" } ] } }, "credit": [ { "lang": "eng", "value": "Alberto Molina" } ], "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "It\u0027s possible to create an email which can be stuck while being processed by PostMaster filters, causing DoS. This issue affects: OTRS AG ((OTRS)) Community Edition 6.0.x version 6.0.1 and later versions. OTRS AG OTRS 7.0.x version 7.0.28 and prior versions; 8.0.x version 8.0.15 and prior versions." } ] }, "generator": { "engine": "Vulnogram 0.0.9" }, "impact": { "cvss": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "LOW", "baseScore": 5.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L", "version": "3.1" } }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "CWE-185 Incorrect Regular Expression" } ] } ] }, "references": { "reference_data": [ { "name": "https://otrs.com/release-notes/otrs-security-advisory-2021-16/", "refsource": "CONFIRM", "url": "https://otrs.com/release-notes/otrs-security-advisory-2021-16/" } ] }, "solution": [ { "lang": "en", "value": "Update to OTRS 8.0.16, OTRS 7.0.29." } ], "source": { "advisory": "OSA-2021-16", "defect": [ "2021070842000819" ], "discovery": "USER" } } } }, "cveMetadata": { "assignerOrgId": "2e1bf29f-dc29-4ed8-830c-7b9348b6f0e8", "assignerShortName": "OTRS", "cveId": "CVE-2021-36093", "datePublished": "2021-09-06T13:15:24.049964Z", "dateReserved": "2021-07-01T00:00:00", "dateUpdated": "2024-09-16T20:36:38.524Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2020-1769
Vulnerability from cvelistv5
Published
2020-03-27 12:47
Modified
2024-09-17 01:27
Severity ?
EPSS score ?
Summary
Autocomplete in the form login screens
References
Impacted products
Vendor | Product | Version | |||||
---|---|---|---|---|---|---|---|
▼ | OTRS AG | ((OTRS)) Community Edition |
Version: 5.0.x < Version: 6.0.x < |
||||
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T06:46:30.922Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://otrs.com/release-notes/otrs-security-advisory-2020-06/" }, { "name": "openSUSE-SU-2020:0551", "tags": [ "vendor-advisory", "x_transferred" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2020-04/msg00038.html" }, { "name": "openSUSE-SU-2020:1475", "tags": [ "vendor-advisory", "x_transferred" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00066.html" }, { "name": "openSUSE-SU-2020:1509", "tags": [ "vendor-advisory", "x_transferred" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00077.html" }, { "name": "[debian-lts-announce] 20230831 [SECURITY] [DLA 3551-1] otrs2 security update", "tags": [ "mailing-list", "x_transferred" ], "url": "https://lists.debian.org/debian-lts-announce/2023/08/msg00040.html" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "((OTRS)) Community Edition", "vendor": "OTRS AG", "versions": [ { "lessThanOrEqual": "5.0.41", "status": "affected", "version": "5.0.x", "versionType": "custom" }, { "lessThanOrEqual": "6.0.26", "status": "affected", "version": "6.0.x", "versionType": "custom" } ] }, { "product": "OTRS", "vendor": "OTRS AG", "versions": [ { "lessThanOrEqual": "7.0.15", "status": "affected", "version": "7.0.x", "versionType": "custom" } ] } ], "credits": [ { "lang": "en", "value": "Martin M\u00f8ller" } ], "datePublic": "2020-03-27T00:00:00", "descriptions": [ { "lang": "en", "value": "In the login screens (in agent and customer interface), Username and Password fields use autocomplete, which might be considered as security issue. This issue affects: ((OTRS)) Community Edition: 5.0.41 and prior versions, 6.0.26 and prior versions. OTRS: 7.0.15 and prior versions." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 3.5, "baseSeverity": "LOW", "confidentialityImpact": "LOW", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:L/I:N/A:N", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-16", "description": "CWE-16 Configuration", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2023-08-31T02:07:09.195145", "orgId": "2e1bf29f-dc29-4ed8-830c-7b9348b6f0e8", "shortName": "OTRS" }, "references": [ { "url": "https://otrs.com/release-notes/otrs-security-advisory-2020-06/" }, { "name": "openSUSE-SU-2020:0551", "tags": [ "vendor-advisory" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2020-04/msg00038.html" }, { "name": "openSUSE-SU-2020:1475", "tags": [ "vendor-advisory" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00066.html" }, { "name": "openSUSE-SU-2020:1509", "tags": [ "vendor-advisory" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00077.html" }, { "name": "[debian-lts-announce] 20230831 [SECURITY] [DLA 3551-1] otrs2 security update", "tags": [ "mailing-list" ], "url": "https://lists.debian.org/debian-lts-announce/2023/08/msg00040.html" } ], "solutions": [ { "lang": "en", "value": "Upgrade to OTRS 7.0.16, ((OTRS)) Community Edition 6.0.27, ((OTRS)) Community Edition 5.0.42.\n\nPatch for ((OTRS)) Community Edition 6: https://github.com/OTRS/otrs/commit/1b74e24582c946d02209acfc248d4ba451251f93\nPatch for ((OTRS)) Community Edition 5: https://github.com/OTRS/otrs/commit/7974ea582211c13730d223fc4dcdffa542af423f" } ], "source": { "advisory": "OSA-2020-06", "defect": [ "2020011042000836" ], "discovery": "EXTERNAL" }, "title": "Autocomplete in the form login screens", "x_generator": { "engine": "Vulnogram 0.0.9" } } }, "cveMetadata": { "assignerOrgId": "2e1bf29f-dc29-4ed8-830c-7b9348b6f0e8", "assignerShortName": "OTRS", "cveId": "CVE-2020-1769", "datePublished": "2020-03-27T12:47:49.378986Z", "dateReserved": "2019-11-29T00:00:00", "dateUpdated": "2024-09-17T01:27:02.769Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2024-43443
Vulnerability from cvelistv5
Published
2024-08-26 08:42
Modified
2024-08-26 14:55
Severity ?
EPSS score ?
Summary
Stored XSS in process management
References
Impacted products
Vendor | Product | Version | |||||
---|---|---|---|---|---|---|---|
▼ | OTRS AG | OTRS |
Version: 7.0.x Version: 8.0.x Version: 2023.x Version: 2024.x |
||||
|
{ "containers": { "adp": [ { "metrics": [ { "other": { "content": { "id": "CVE-2024-43443", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-08-26T14:55:41.494333Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-08-26T14:55:57.618Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "modules": [ "Process Management" ], "product": "OTRS", "vendor": "OTRS AG", "versions": [ { "lessThanOrEqual": "7.0.50", "status": "affected", "version": "7.0.x", "versionType": "Patch" }, { "status": "affected", "version": "8.0.x" }, { "status": "affected", "version": "2023.x" }, { "lessThanOrEqual": "2024.5.x", "status": "affected", "version": "2024.x", "versionType": "Patch" } ] }, { "defaultStatus": "affected", "modules": [ "Process Management" ], "product": "((OTRS)) Community Edition", "vendor": "OTRS AG", "versions": [ { "status": "affected", "version": "6.0.x" } ] } ], "credits": [ { "lang": "en", "type": "reporter", "value": "Special thanks to Marek Holka for reporting these vulnerability." } ], "datePublic": "2024-08-26T08:00:00.000Z", "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "Improper Neutralization of Input done by an attacker with admin privileges (\u0027Cross-site Scripting\u0027) in Process Management modules of OTRS and ((OTRS)) Community Edition allows Cross-Site Scripting (XSS) within the Process Management targeting other admins.\u003cbr\u003e\u003cp\u003eThis issue affects: \u003c/p\u003e\u003cul\u003e\u003cli\u003eOTRS from 7.0.X through 7.0.50\u003c/li\u003e\u003cli\u003eOTRS 8.0.X\u003c/li\u003e\u003cli\u003eOTRS 2023.X\u003c/li\u003e\u003cli\u003eOTRS from 2024.X through 2024.5.X\u003c/li\u003e\u003cli\u003e((OTRS)) Community Edition: 6.0.x\u003cbr\u003e\u003c/li\u003e\u003c/ul\u003e\u003cdiv\u003eProducts based on the ((OTRS)) Community Edition also very likely to be affected\u003c/div\u003e\u003cbr\u003e" } ], "value": "Improper Neutralization of Input done by an attacker with admin privileges (\u0027Cross-site Scripting\u0027) in Process Management modules of OTRS and ((OTRS)) Community Edition allows Cross-Site Scripting (XSS) within the Process Management targeting other admins.\nThis issue affects: \n\n * OTRS from 7.0.X through 7.0.50\n * OTRS 8.0.X\n * OTRS 2023.X\n * OTRS from 2024.X through 2024.5.X\n * ((OTRS)) Community Edition: 6.0.x\n\nProducts based on the ((OTRS)) Community Edition also very likely to be affected" } ], "impacts": [ { "capecId": "CAPEC-63", "descriptions": [ { "lang": "en", "value": "CAPEC-63 Cross-Site Scripting (XSS)" } ] } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 4.9, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "HIGH", "privilegesRequired": "HIGH", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:H/A:N", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-790", "description": "CWE-790 Improper Filtering of Special Elements", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-08-26T08:42:55.095Z", "orgId": "2e1bf29f-dc29-4ed8-830c-7b9348b6f0e8", "shortName": "OTRS" }, "references": [ { "url": "https://otrs.com/release-notes/otrs-security-advisory-2024-11/" } ], "solutions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "Update to OTRS 2024.6.x or OTRS 7.0.51\u003cbr\u003e" } ], "value": "Update to OTRS 2024.6.x or OTRS 7.0.51" } ], "source": { "advisory": "OSA-2024-11", "defect": [ "Issue#2592", "Ticket#2024061942000965" ], "discovery": "EXTERNAL" }, "title": "Stored XSS in process management", "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "2e1bf29f-dc29-4ed8-830c-7b9348b6f0e8", "assignerShortName": "OTRS", "cveId": "CVE-2024-43443", "datePublished": "2024-08-26T08:42:55.095Z", "dateReserved": "2024-08-13T13:38:47.972Z", "dateUpdated": "2024-08-26T14:55:57.618Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2022-39051
Vulnerability from cvelistv5
Published
2022-09-05 06:40
Modified
2024-09-16 17:18
Severity ?
EPSS score ?
Summary
Perl Code execution in Template Toolkit
References
▼ | URL | Tags |
---|---|---|
https://otrs.com/release-notes/otrs-security-advisory-2022-12/ | x_refsource_CONFIRM |
Impacted products
Vendor | Product | Version | |||||
---|---|---|---|---|---|---|---|
▼ | OTRS AG | OTRS |
Version: 7.0.x 7.0.36 Version: 8.0.x 8.0.24 |
||||
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T11:10:32.406Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://otrs.com/release-notes/otrs-security-advisory-2022-12/" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "OTRS", "vendor": "OTRS AG", "versions": [ { "status": "affected", "version": "7.0.x 7.0.36" }, { "status": "affected", "version": "8.0.x 8.0.24" } ] }, { "product": "((OTRS)) Community Edition", "vendor": "OTRS AG", "versions": [ { "lessThan": "6.0.x*", "status": "affected", "version": "6.0.1", "versionType": "custom" } ] } ], "datePublic": "2022-09-05T00:00:00", "descriptions": [ { "lang": "en", "value": "Attacker might be able to execute malicious Perl code in the Template toolkit, by having the admin installing an unverified 3th party package" } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 6.8, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "HIGH", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-913", "description": "CWE-913 Improper Control of Dynamically-Managed Code Resources", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2022-09-05T06:40:12", "orgId": "2e1bf29f-dc29-4ed8-830c-7b9348b6f0e8", "shortName": "OTRS" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "https://otrs.com/release-notes/otrs-security-advisory-2022-12/" } ], "solutions": [ { "lang": "en", "value": "Update to OTRS 8.0.25 or OTRS 7.0.37." } ], "source": { "advisory": "OSA-2022-12", "defect": [ "2022042942000784" ], "discovery": "USER" }, "title": "Perl Code execution in Template Toolkit", "x_generator": { "engine": "Vulnogram 0.0.9" }, "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "security@otrs.com", "DATE_PUBLIC": "2022-09-05T07:00:00.000Z", "ID": "CVE-2022-39051", "STATE": "PUBLIC", "TITLE": "Perl Code execution in Template Toolkit" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "OTRS", "version": { "version_data": [ { "version_name": "7.0.x", "version_value": "7.0.36" }, { "version_name": "8.0.x", "version_value": "8.0.24" } ] } }, { "product_name": "((OTRS)) Community Edition", "version": { "version_data": [ { "version_affected": "\u003e=", "version_name": "6.0.x", "version_value": "6.0.1" } ] } } ] }, "vendor_name": "OTRS AG" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Attacker might be able to execute malicious Perl code in the Template toolkit, by having the admin installing an unverified 3th party package" } ] }, "generator": { "engine": "Vulnogram 0.0.9" }, "impact": { "cvss": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 6.8, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "HIGH", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" } }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "CWE-913 Improper Control of Dynamically-Managed Code Resources" } ] } ] }, "references": { "reference_data": [ { "name": "https://otrs.com/release-notes/otrs-security-advisory-2022-12/", "refsource": "CONFIRM", "url": "https://otrs.com/release-notes/otrs-security-advisory-2022-12/" } ] }, "solution": [ { "lang": "en", "value": "Update to OTRS 8.0.25 or OTRS 7.0.37." } ], "source": { "advisory": "OSA-2022-12", "defect": [ "2022042942000784" ], "discovery": "USER" } } } }, "cveMetadata": { "assignerOrgId": "2e1bf29f-dc29-4ed8-830c-7b9348b6f0e8", "assignerShortName": "OTRS", "cveId": "CVE-2022-39051", "datePublished": "2022-09-05T06:40:12.771350Z", "dateReserved": "2022-08-31T00:00:00", "dateUpdated": "2024-09-16T17:18:42.122Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2020-1772
Vulnerability from cvelistv5
Published
2020-03-27 12:47
Modified
2024-09-16 23:25
Severity ?
EPSS score ?
Summary
Information Disclosure
References
Impacted products
Vendor | Product | Version | |||||
---|---|---|---|---|---|---|---|
▼ | OTRS AG | ((OTRS)) Community Edition |
Version: 5.0.x < Version: 6.0.x < |
||||
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T06:46:30.921Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://otrs.com/release-notes/otrs-security-advisory-2020-09/" }, { "name": "openSUSE-SU-2020:0551", "tags": [ "vendor-advisory", "x_transferred" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2020-04/msg00038.html" }, { "name": "[debian-lts-announce] 20200501 [SECURITY] [DLA 2198-1] otrs2 security update", "tags": [ "mailing-list", "x_transferred" ], "url": "https://lists.debian.org/debian-lts-announce/2020/05/msg00000.html" }, { "name": "openSUSE-SU-2020:1475", "tags": [ "vendor-advisory", "x_transferred" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00066.html" }, { "name": "openSUSE-SU-2020:1509", "tags": [ "vendor-advisory", "x_transferred" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00077.html" }, { "name": "[debian-lts-announce] 20230831 [SECURITY] [DLA 3551-1] otrs2 security update", "tags": [ "mailing-list", "x_transferred" ], "url": "https://lists.debian.org/debian-lts-announce/2023/08/msg00040.html" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "((OTRS)) Community Edition", "vendor": "OTRS AG", "versions": [ { "lessThanOrEqual": "5.0.41", "status": "affected", "version": "5.0.x", "versionType": "custom" }, { "lessThanOrEqual": "6.0.26", "status": "affected", "version": "6.0.x", "versionType": "custom" } ] }, { "product": "OTRS", "vendor": "OTRS AG", "versions": [ { "lessThanOrEqual": "7.0.15", "status": "affected", "version": "7.0.x", "versionType": "custom" } ] } ], "credits": [ { "lang": "en", "value": "Fabian Henneke" } ], "datePublic": "2020-03-27T00:00:00", "descriptions": [ { "lang": "en", "value": "It\u0027s possible to craft Lost Password requests with wildcards in the Token value, which allows attacker to retrieve valid Token(s), generated by users which already requested new passwords. This issue affects: ((OTRS)) Community Edition 5.0.41 and prior versions, 6.0.26 and prior versions. OTRS: 7.0.15 and prior versions." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:L/A:N", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-155", "description": "CWE-155", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2023-08-31T02:06:30.794451", "orgId": "2e1bf29f-dc29-4ed8-830c-7b9348b6f0e8", "shortName": "OTRS" }, "references": [ { "url": "https://otrs.com/release-notes/otrs-security-advisory-2020-09/" }, { "name": "openSUSE-SU-2020:0551", "tags": [ "vendor-advisory" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2020-04/msg00038.html" }, { "name": "[debian-lts-announce] 20200501 [SECURITY] [DLA 2198-1] otrs2 security update", "tags": [ "mailing-list" ], "url": "https://lists.debian.org/debian-lts-announce/2020/05/msg00000.html" }, { "name": "openSUSE-SU-2020:1475", "tags": [ "vendor-advisory" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00066.html" }, { "name": "openSUSE-SU-2020:1509", "tags": [ "vendor-advisory" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00077.html" }, { "name": "[debian-lts-announce] 20230831 [SECURITY] [DLA 3551-1] otrs2 security update", "tags": [ "mailing-list" ], "url": "https://lists.debian.org/debian-lts-announce/2023/08/msg00040.html" } ], "solutions": [ { "lang": "en", "value": "Upgrade to OTRS 7.0.16, ((OTRS)) Community Edition 6.0.27, 5.0.42\n\nPatch for ((OTRS)) Community Edition 6: https://github.com/OTRS/otrs/commit/c0255365d5c455272b2b9e7bb1f6c96c3fce441b\nPatch for ((OTRS)) Community Edition 5: https://github.com/OTRS/otrs/commit/96cc7826d6ce260204ff629fc968edd2787b7f6b" } ], "source": { "advisory": "OSA-2020-09", "defect": [ "2020012742001563" ], "discovery": "EXTERNAL" }, "title": "Information Disclosure", "x_generator": { "engine": "Vulnogram 0.0.9" } } }, "cveMetadata": { "assignerOrgId": "2e1bf29f-dc29-4ed8-830c-7b9348b6f0e8", "assignerShortName": "OTRS", "cveId": "CVE-2020-1772", "datePublished": "2020-03-27T12:47:49.502529Z", "dateReserved": "2019-11-29T00:00:00", "dateUpdated": "2024-09-16T23:25:42.434Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2020-1765
Vulnerability from cvelistv5
Published
2020-01-10 15:08
Modified
2024-09-16 22:15
Severity ?
EPSS score ?
Summary
Spoofing of From field in several screens
References
Impacted products
Vendor | Product | Version | |||||
---|---|---|---|---|---|---|---|
▼ | OTRS AG | ((OTRS)) Community Edition |
Version: 5.0.x version 5.0.39 and prior versions Version: 6.0.x version 6.0.24 and prior versions |
||||
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T06:46:30.988Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://otrs.com/release-notes/otrs-security-advisory-2020-01/" }, { "name": "[debian-lts-announce] 20200129 [SECURITY] [DLA 2079-1] otrs2 security update", "tags": [ "mailing-list", "x_transferred" ], "url": "https://lists.debian.org/debian-lts-announce/2020/01/msg00027.html" }, { "name": "openSUSE-SU-2020:0551", "tags": [ "vendor-advisory", "x_transferred" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2020-04/msg00038.html" }, { "name": "openSUSE-SU-2020:1475", "tags": [ "vendor-advisory", "x_transferred" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00066.html" }, { "name": "openSUSE-SU-2020:1509", "tags": [ "vendor-advisory", "x_transferred" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00077.html" }, { "name": "[debian-lts-announce] 20230831 [SECURITY] [DLA 3551-1] otrs2 security update", "tags": [ "mailing-list", "x_transferred" ], "url": "https://lists.debian.org/debian-lts-announce/2023/08/msg00040.html" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "((OTRS)) Community Edition", "vendor": "OTRS AG", "versions": [ { "status": "affected", "version": "5.0.x version 5.0.39 and prior versions" }, { "status": "affected", "version": "6.0.x version 6.0.24 and prior versions" } ] }, { "product": "OTRS", "vendor": "OTRS AG", "versions": [ { "status": "affected", "version": "7.0.x version 7.0.13 and prior versions" } ] } ], "credits": [ { "lang": "en", "value": "Sebastian Renker, Jonas Becker" } ], "datePublic": "2020-01-10T00:00:00", "descriptions": [ { "lang": "en", "value": "An improper control of parameters allows the spoofing of the from fields of the following screens: AgentTicketCompose, AgentTicketForward, AgentTicketBounce and AgentTicketEmailOutbound. This issue affects: ((OTRS)) Community Edition 5.0.x version 5.0.39 and prior versions; 6.0.x version 6.0.24 and prior versions. OTRS 7.0.x version 7.0.13 and prior versions." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 3.5, "baseSeverity": "LOW", "confidentialityImpact": "NONE", "integrityImpact": "LOW", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:L/A:N", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-472", "description": "CWE-472 External Control of Assumed-Immutable Web Parameter", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2023-08-31T02:06:14.280325", "orgId": "2e1bf29f-dc29-4ed8-830c-7b9348b6f0e8", "shortName": "OTRS" }, "references": [ { "url": "https://otrs.com/release-notes/otrs-security-advisory-2020-01/" }, { "name": "[debian-lts-announce] 20200129 [SECURITY] [DLA 2079-1] otrs2 security update", "tags": [ "mailing-list" ], "url": "https://lists.debian.org/debian-lts-announce/2020/01/msg00027.html" }, { "name": "openSUSE-SU-2020:0551", "tags": [ "vendor-advisory" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2020-04/msg00038.html" }, { "name": "openSUSE-SU-2020:1475", "tags": [ "vendor-advisory" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00066.html" }, { "name": "openSUSE-SU-2020:1509", "tags": [ "vendor-advisory" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00077.html" }, { "name": "[debian-lts-announce] 20230831 [SECURITY] [DLA 3551-1] otrs2 security update", "tags": [ "mailing-list" ], "url": "https://lists.debian.org/debian-lts-announce/2023/08/msg00040.html" } ], "solutions": [ { "lang": "en", "value": "Upgrade to OTRS 7.0.14, ((OTRS)) Community Edition 6.0.25, ((OTRS)) Community Edition 5.0.40" }, { "lang": "en", "value": "Patch for ((OTRS)) Community Edition 6: https://github.com/OTRS/otrs/commit/d146d4997cbd6e1370669784c6a2ec8d64655252 \nPatch for ((OTRS)) Community Edition 5: https://github.com/OTRS/otrs/commit/874889b86abea4c01ceb1368a836b66694fae1c3" } ], "source": { "advisory": "OSA-2020-01", "defect": [ "2019100942003876" ], "discovery": "EXTERNAL" }, "title": "Spoofing of From field in several screens", "x_generator": { "engine": "Vulnogram 0.0.9" } } }, "cveMetadata": { "assignerOrgId": "2e1bf29f-dc29-4ed8-830c-7b9348b6f0e8", "assignerShortName": "OTRS", "cveId": "CVE-2020-1765", "datePublished": "2020-01-10T15:08:55.756034Z", "dateReserved": "2019-11-29T00:00:00", "dateUpdated": "2024-09-16T22:15:10.396Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2021-36094
Vulnerability from cvelistv5
Published
2021-09-06 13:15
Modified
2024-09-16 19:09
Severity ?
EPSS score ?
Summary
XSS attack in appointment edit popup screen
References
▼ | URL | Tags |
---|---|---|
https://otrs.com/release-notes/otrs-security-advisory-2021-17/ | x_refsource_CONFIRM |
Impacted products
Vendor | Product | Version | |||||
---|---|---|---|---|---|---|---|
▼ | OTRS AG | ((OTRS)) Community Edition |
Version: 6.0.1 < 6.0.x* |
||||
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T00:47:43.810Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://otrs.com/release-notes/otrs-security-advisory-2021-17/" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "((OTRS)) Community Edition", "vendor": "OTRS AG", "versions": [ { "lessThan": "6.0.x*", "status": "affected", "version": "6.0.1", "versionType": "custom" } ] }, { "product": "OTRS", "vendor": "OTRS AG", "versions": [ { "lessThanOrEqual": "7.0.28", "status": "affected", "version": "7.0.x", "versionType": "custom" } ] } ], "datePublic": "2021-09-06T00:00:00", "descriptions": [ { "lang": "en", "value": "It\u0027s possible to craft a request for appointment edit screen, which could lead to the XSS attack. This issue affects: OTRS AG ((OTRS)) Community Edition 6.0.x version 6.0.1 and later versions. OTRS AG OTRS 7.0.x version 7.0.28 and prior versions." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.7, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:H/A:N", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-79", "description": "CWE-79 Cross-site Scripting (XSS)", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2021-09-06T13:15:25", "orgId": "2e1bf29f-dc29-4ed8-830c-7b9348b6f0e8", "shortName": "OTRS" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "https://otrs.com/release-notes/otrs-security-advisory-2021-17/" } ], "solutions": [ { "lang": "en", "value": "Update to OTRS 7.0.29." } ], "source": { "advisory": "OSA-2021-17", "defect": [ "2021062442001352" ], "discovery": "USER" }, "title": "XSS attack in appointment edit popup screen", "x_generator": { "engine": "Vulnogram 0.0.9" }, "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "security@otrs.com", "DATE_PUBLIC": "2021-09-06T00:00:00.000Z", "ID": "CVE-2021-36094", "STATE": "PUBLIC", "TITLE": "XSS attack in appointment edit popup screen" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "((OTRS)) Community Edition", "version": { "version_data": [ { "version_affected": "\u003e=", "version_name": "6.0.x", "version_value": "6.0.1" } ] } }, { "product_name": "OTRS", "version": { "version_data": [ { "version_affected": "\u003c=", "version_name": "7.0.x", "version_value": "7.0.28" } ] } } ] }, "vendor_name": "OTRS AG" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "It\u0027s possible to craft a request for appointment edit screen, which could lead to the XSS attack. This issue affects: OTRS AG ((OTRS)) Community Edition 6.0.x version 6.0.1 and later versions. OTRS AG OTRS 7.0.x version 7.0.28 and prior versions." } ] }, "generator": { "engine": "Vulnogram 0.0.9" }, "impact": { "cvss": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.7, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:H/A:N", "version": "3.1" } }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "CWE-79 Cross-site Scripting (XSS)" } ] } ] }, "references": { "reference_data": [ { "name": "https://otrs.com/release-notes/otrs-security-advisory-2021-17/", "refsource": "CONFIRM", "url": "https://otrs.com/release-notes/otrs-security-advisory-2021-17/" } ] }, "solution": [ { "lang": "en", "value": "Update to OTRS 7.0.29." } ], "source": { "advisory": "OSA-2021-17", "defect": [ "2021062442001352" ], "discovery": "USER" } } } }, "cveMetadata": { "assignerOrgId": "2e1bf29f-dc29-4ed8-830c-7b9348b6f0e8", "assignerShortName": "OTRS", "cveId": "CVE-2021-36094", "datePublished": "2021-09-06T13:15:25.712091Z", "dateReserved": "2021-07-01T00:00:00", "dateUpdated": "2024-09-16T19:09:09.574Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2021-36091
Vulnerability from cvelistv5
Published
2021-07-26 04:25
Modified
2024-09-16 17:59
Severity ?
EPSS score ?
Summary
Unautorized access to the calendar appointments
References
Impacted products
Vendor | Product | Version | |||||
---|---|---|---|---|---|---|---|
▼ | OTRS AG | ((OTRS)) Community Edition |
Version: 6.0.1 < 6.0.x* |
||||
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T00:47:43.812Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://otrs.com/release-notes/otrs-security-advisory-2021-14/" }, { "name": "[debian-lts-announce] 20230831 [SECURITY] [DLA 3551-1] otrs2 security update", "tags": [ "mailing-list", "x_transferred" ], "url": "https://lists.debian.org/debian-lts-announce/2023/08/msg00040.html" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "((OTRS)) Community Edition", "vendor": "OTRS AG", "versions": [ { "lessThan": "6.0.x*", "status": "affected", "version": "6.0.1", "versionType": "custom" } ] }, { "product": "OTRS", "vendor": "OTRS AG", "versions": [ { "lessThan": "7.0.27", "status": "affected", "version": "7.0.x", "versionType": "custom" } ] } ], "datePublic": "2021-07-26T00:00:00", "descriptions": [ { "lang": "en", "value": "Agents are able to list appointments in the calendars without required permissions. This issue affects: OTRS AG ((OTRS)) Community Edition: 6.0.x version 6.0.1 and later versions. OTRS AG OTRS: 7.0.x versions prior to 7.0.27." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 3.5, "baseSeverity": "LOW", "confidentialityImpact": "LOW", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:L/I:N/A:N", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-200", "description": "CWE-200 Information Exposure", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2023-08-31T02:06:38.799737", "orgId": "2e1bf29f-dc29-4ed8-830c-7b9348b6f0e8", "shortName": "OTRS" }, "references": [ { "url": "https://otrs.com/release-notes/otrs-security-advisory-2021-14/" }, { "name": "[debian-lts-announce] 20230831 [SECURITY] [DLA 3551-1] otrs2 security update", "tags": [ "mailing-list" ], "url": "https://lists.debian.org/debian-lts-announce/2023/08/msg00040.html" } ], "solutions": [ { "lang": "en", "value": "Update to OTRS 7.0.28." } ], "source": { "advisory": "OSA-2021-14", "defect": [ "2021062442001398" ], "discovery": "USER" }, "title": "Unautorized access to the calendar appointments", "x_generator": { "engine": "Vulnogram 0.0.9" } } }, "cveMetadata": { "assignerOrgId": "2e1bf29f-dc29-4ed8-830c-7b9348b6f0e8", "assignerShortName": "OTRS", "cveId": "CVE-2021-36091", "datePublished": "2021-07-26T04:25:41.820529Z", "dateReserved": "2021-07-01T00:00:00", "dateUpdated": "2024-09-16T17:59:18.697Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2023-38060
Vulnerability from cvelistv5
Published
2023-07-24 08:28
Modified
2024-10-17 13:03
Severity ?
EPSS score ?
Summary
Host header injection by attachments in web service
References
Impacted products
Vendor | Product | Version | |||||
---|---|---|---|---|---|---|---|
▼ | OTRS AG | OTRS |
Version: 7.0.x Version: 8.0.x |
||||
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T17:30:13.644Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://otrs.com/release-notes/otrs-security-advisory-2023-04/" }, { "tags": [ "x_transferred" ], "url": "https://lists.debian.org/debian-lts-announce/2023/08/msg00040.html" } ], "title": "CVE Program Container" }, { "metrics": [ { "other": { "content": { "id": "CVE-2023-38060", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-10-17T13:01:31.274099Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-10-17T13:03:28.089Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "affected", "modules": [ "Generic Interface" ], "product": "OTRS", "vendor": "OTRS AG", "versions": [ { "lessThan": "7.0.45", "status": "affected", "version": "7.0.x", "versionType": "Patch" }, { "lessThan": "8.0.35", "status": "affected", "version": "8.0.x", "versionType": "Patch" } ] }, { "defaultStatus": "affected", "modules": [ "Generic Interface" ], "product": "((OTRS)) Community Edition", "vendor": "OTRS AG", "versions": [ { "lessThanOrEqual": "6.0.34", "status": "affected", "version": "6.0.1", "versionType": "All" } ] } ], "credits": [ { "lang": "en", "type": "finder", "user": "00000000-0000-4000-9000-000000000000", "value": "Special thanks to Tim P\u00fcttmanns for reporting these vulnerability." } ], "datePublic": "2023-07-24T07:00:00.000Z", "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "\u003cdiv\u003eImproper Input Validation vulnerability in the ContentType parameter for attachments on TicketCreate or TicketUpdate operations of the OTRS Generic Interface modules allows any authenticated attacker to to perform an host header injection for the ContentType header of the attachment.\u0026nbsp;\u003cbr\u003e\u003c/div\u003e\u003cp\u003eThis issue affects OTRS: from 7.0.X before 7.0.45, from 8.0.X before 8.0.35; ((OTRS)) Community Edition: from 6.0.1 through 6.0.34.\u003c/p\u003e" } ], "value": "Improper Input Validation vulnerability in the ContentType parameter for attachments on TicketCreate or TicketUpdate operations of the OTRS Generic Interface modules allows any authenticated attacker to to perform an host header injection for the ContentType header of the attachment.\u00a0\n\n\nThis issue affects OTRS: from 7.0.X before 7.0.45, from 8.0.X before 8.0.35; ((OTRS)) Community Edition: from 6.0.1 through 6.0.34.\n\n" } ], "impacts": [ { "capecId": "CAPEC-141", "descriptions": [ { "lang": "en", "value": "CAPEC-141 Cache Poisoning" } ] } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "LOW", "baseScore": 6.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-20", "description": "CWE-20 Improper Input Validation", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2023-07-24T08:28:13.816Z", "orgId": "2e1bf29f-dc29-4ed8-830c-7b9348b6f0e8", "shortName": "OTRS" }, "references": [ { "url": "https://otrs.com/release-notes/otrs-security-advisory-2023-04/" }, { "url": "https://lists.debian.org/debian-lts-announce/2023/08/msg00040.html" } ], "solutions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "Update to OTRS 8.0.35 or OTRS 7.0.45\u003cbr\u003e" } ], "value": "Update to OTRS 8.0.35 or OTRS 7.0.45\n" } ], "source": { "advisory": "OSA-2023-04", "defect": [ "Issue#1027", "Ticket#2023041142001466" ], "discovery": "EXTERNAL" }, "title": "Host header injection by attachments in web service", "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "2e1bf29f-dc29-4ed8-830c-7b9348b6f0e8", "assignerShortName": "OTRS", "cveId": "CVE-2023-38060", "datePublished": "2023-07-24T08:28:13.816Z", "dateReserved": "2023-07-12T08:05:38.781Z", "dateUpdated": "2024-10-17T13:03:28.089Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2024-43442
Vulnerability from cvelistv5
Published
2024-08-26 08:42
Modified
2024-08-26 15:27
Severity ?
EPSS score ?
Summary
Stored XSS in System Configuration
References
Impacted products
Vendor | Product | Version | |||||
---|---|---|---|---|---|---|---|
▼ | OTRS AG | OTRS |
Version: 7.0.x Version: 8.0.x Version: 2023.x Version: 2024.x |
||||
|
{ "containers": { "adp": [ { "metrics": [ { "other": { "content": { "id": "CVE-2024-43442", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-08-26T15:26:34.955357Z", "version": "2.0.3" }, "type": "ssvc" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-79", "description": "CWE-79 Improper Neutralization of Input During Web Page Generation (\u0027Cross-site Scripting\u0027)", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-08-26T15:27:15.700Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "modules": [ "System Configuration" ], "product": "OTRS", "vendor": "OTRS AG", "versions": [ { "lessThanOrEqual": "7.0.50", "status": "affected", "version": "7.0.x", "versionType": "Patch" }, { "status": "affected", "version": "8.0.x" }, { "status": "affected", "version": "2023.x" }, { "lessThanOrEqual": "2024.5.x", "status": "affected", "version": "2024.x", "versionType": "Patch" } ] }, { "defaultStatus": "affected", "product": "((OTRS)) Community Edition", "vendor": "OTRS AG", "versions": [ { "status": "affected", "version": "6.0.x" } ] } ], "credits": [ { "lang": "en", "type": "reporter", "value": "Special thanks to Marek Holka for reporting these vulnerability." } ], "datePublic": "2024-08-26T08:00:00.000Z", "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "Improper Neutralization of Input done by an attacker with admin privileges (\u0027Cross-site Scripting\u0027) in\u0026nbsp; OTRS (System Configuration modules) and ((OTRS)) Community Edition allows Cross-Site Scripting (XSS) within the System Configuration targeting other admins.\u003cbr\u003e\u003cp\u003eThis issue affects:\u0026nbsp;\u003c/p\u003e\u003cul\u003e\u003cli\u003eOTRS from 7.0.X through 7.0.50\u003c/li\u003e\u003cli\u003eOTRS 8.0.X\u003c/li\u003e\u003cli\u003eOTRS 2023.X\u003c/li\u003e\u003cli\u003eOTRS from 2024.X through 2024.5.X\u003c/li\u003e\u003cli\u003e((OTRS)) Community Edition: 6.0.x\u003cbr\u003e\u003c/li\u003e\u003c/ul\u003e\u003cdiv\u003eProducts based on the ((OTRS)) Community Edition also very likely to be affected\u003cbr\u003e\u003c/div\u003e" } ], "value": "Improper Neutralization of Input done by an attacker with admin privileges (\u0027Cross-site Scripting\u0027) in\u00a0 OTRS (System Configuration modules) and ((OTRS)) Community Edition allows Cross-Site Scripting (XSS) within the System Configuration targeting other admins.\nThis issue affects:\u00a0\n\n * OTRS from 7.0.X through 7.0.50\n * OTRS 8.0.X\n * OTRS 2023.X\n * OTRS from 2024.X through 2024.5.X\n * ((OTRS)) Community Edition: 6.0.x\n\nProducts based on the ((OTRS)) Community Edition also very likely to be affected" } ], "impacts": [ { "capecId": "CAPEC-63", "descriptions": [ { "lang": "en", "value": "CAPEC-63 Cross-Site Scripting (XSS)" } ] } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 4.9, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "HIGH", "privilegesRequired": "HIGH", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:H/A:N", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-790", "description": "CWE-790 Improper Filtering of Special Elements", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-08-26T08:42:39.842Z", "orgId": "2e1bf29f-dc29-4ed8-830c-7b9348b6f0e8", "shortName": "OTRS" }, "references": [ { "url": "https://otrs.com/release-notes/otrs-security-advisory-2024-10/" } ], "solutions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "Update to OTRS 2024.6.x or OTRS 7.0.51\u003cbr\u003e" } ], "value": "Update to OTRS 2024.6.x or OTRS 7.0.51" } ], "source": { "advisory": "OSA-2024-10", "defect": [ "Ticket#2024061942000965", "Issue#2592" ], "discovery": "EXTERNAL" }, "title": "Stored XSS in System Configuration", "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "2e1bf29f-dc29-4ed8-830c-7b9348b6f0e8", "assignerShortName": "OTRS", "cveId": "CVE-2024-43442", "datePublished": "2024-08-26T08:42:39.842Z", "dateReserved": "2024-08-13T13:38:47.972Z", "dateUpdated": "2024-08-26T15:27:15.700Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2023-38057
Vulnerability from cvelistv5
Published
2023-07-24 08:27
Modified
2024-10-17 13:02
Severity ?
EPSS score ?
Summary
XSS stored in survey answers
References
Impacted products
Vendor | Product | Version | |||||
---|---|---|---|---|---|---|---|
▼ | OTRS AG | OTRS |
Version: 7.0.x Version: 8.0.x |
||||
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T17:30:12.921Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://otrs.com/release-notes/otrs-security-advisory-2023-06/" } ], "title": "CVE Program Container" }, { "metrics": [ { "other": { "content": { "id": "CVE-2023-38057", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-10-17T13:01:44.457515Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-10-17T13:02:55.563Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "affected", "packageName": "Survey", "product": "OTRS", "vendor": "OTRS AG", "versions": [ { "lessThan": "7.0.32", "status": "affected", "version": "7.0.x", "versionType": "Patch" }, { "lessThan": "8.0.13", "status": "affected", "version": "8.0.x", "versionType": "Patch" } ] }, { "defaultStatus": "affected", "packageName": "Survey", "product": "((OTRS)) Community Edition", "vendor": "OTRS AG", "versions": [ { "lessThanOrEqual": "6.0.22", "status": "affected", "version": "6.0.x", "versionType": "All" } ] } ], "configurations": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "Free text answers have to be used\u003cbr\u003e" } ], "value": "Free text answers have to be used\n" } ], "credits": [ { "lang": "en", "type": "finder", "user": "00000000-0000-4000-9000-000000000000", "value": "Special thanks to Daniel Mizael, Raphael Fiorin and Marcelo Makotofrom for reporting these vulnerability." } ], "datePublic": "2023-07-24T07:00:00.000Z", "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "An improper input validation vulnerability in OTRS Survey modules allows any attacker with a link to a valid and unanswered survey request to inject javascript code in free text answers. This allows a cross site scripting attack while reading the replies as authenticated agent.\u003cbr\u003e\u003cp\u003eThis issue affects OTRS Survey module from 7.0.X before 7.0.32, from 8.0.X before 8.0.13 and ((OTRS)) Community Edition Survey module from 6.0.X through 6.0.22.\u003c/p\u003e" } ], "value": "An improper input validation vulnerability in OTRS Survey modules allows any attacker with a link to a valid and unanswered survey request to inject javascript code in free text answers. This allows a cross site scripting attack while reading the replies as authenticated agent.\nThis issue affects OTRS Survey module from 7.0.X before 7.0.32, from 8.0.X before 8.0.13 and ((OTRS)) Community Edition Survey module from 6.0.X through 6.0.22.\n\n" } ], "impacts": [ { "capecId": "CAPEC-63", "descriptions": [ { "lang": "en", "value": "CAPEC-63 Cross-Site Scripting (XSS)" } ] } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 4.1, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "LOW", "privilegesRequired": "LOW", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:N/I:L/A:N", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-20", "description": "CWE-20 Improper Input Validation", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2023-07-24T08:27:55.315Z", "orgId": "2e1bf29f-dc29-4ed8-830c-7b9348b6f0e8", "shortName": "OTRS" }, "references": [ { "url": "https://otrs.com/release-notes/otrs-security-advisory-2023-06/" } ], "solutions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "\nUpdate Survey package to version 8.0.13 or 7.0.32\n\u003cbr\u003e" } ], "value": "Update Survey package to version 8.0.13 or 7.0.32\n\n" } ], "source": { "advisory": "OSA-2023-06", "defect": [ "Issue#769", "Ticket#2023020942001367" ], "discovery": "EXTERNAL" }, "title": "XSS stored in survey answers", "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "2e1bf29f-dc29-4ed8-830c-7b9348b6f0e8", "assignerShortName": "OTRS", "cveId": "CVE-2023-38057", "datePublished": "2023-07-24T08:27:55.315Z", "dateReserved": "2023-07-12T08:05:38.780Z", "dateUpdated": "2024-10-17T13:02:55.563Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2020-1771
Vulnerability from cvelistv5
Published
2020-03-27 12:47
Modified
2024-09-17 03:28
Severity ?
EPSS score ?
Summary
Possible XSS in Customer user address book
References
Impacted products
Vendor | Product | Version | |||||
---|---|---|---|---|---|---|---|
▼ | OTRS AG | ((OTRS)) Community Edition |
Version: 6.0.x < |
||||
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T06:46:30.886Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://otrs.com/release-notes/otrs-security-advisory-2020-08/" }, { "name": "openSUSE-SU-2020:0551", "tags": [ "vendor-advisory", "x_transferred" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2020-04/msg00038.html" }, { "name": "openSUSE-SU-2020:1475", "tags": [ "vendor-advisory", "x_transferred" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00066.html" }, { "name": "openSUSE-SU-2020:1509", "tags": [ "vendor-advisory", "x_transferred" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00077.html" }, { "name": "[debian-lts-announce] 20230831 [SECURITY] [DLA 3551-1] otrs2 security update", "tags": [ "mailing-list", "x_transferred" ], "url": "https://lists.debian.org/debian-lts-announce/2023/08/msg00040.html" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "((OTRS)) Community Edition", "vendor": "OTRS AG", "versions": [ { "lessThanOrEqual": "6.0.26", "status": "affected", "version": "6.0.x", "versionType": "custom" } ] }, { "product": "OTRS", "vendor": "OTRS AG", "versions": [ { "lessThanOrEqual": "7.0.15", "status": "affected", "version": "7.0.x", "versionType": "custom" } ] } ], "credits": [ { "lang": "en", "value": "Christoph Wuetschner" } ], "datePublic": "2020-03-27T00:00:00", "descriptions": [ { "lang": "en", "value": "Attacker is able craft an article with a link to the customer address book with malicious content (JavaScript). When agent opens the link, JavaScript code is executed due to the missing parameter encoding. This issue affects: ((OTRS)) Community Edition: 6.0.26 and prior versions. OTRS: 7.0.15 and prior versions." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 4.6, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:L/I:L/A:N", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-79", "description": "CWE-79 Cross-site Scripting (XSS)", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2023-08-31T02:06:17.362255", "orgId": "2e1bf29f-dc29-4ed8-830c-7b9348b6f0e8", "shortName": "OTRS" }, "references": [ { "url": "https://otrs.com/release-notes/otrs-security-advisory-2020-08/" }, { "name": "openSUSE-SU-2020:0551", "tags": [ "vendor-advisory" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2020-04/msg00038.html" }, { "name": "openSUSE-SU-2020:1475", "tags": [ "vendor-advisory" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00066.html" }, { "name": "openSUSE-SU-2020:1509", "tags": [ "vendor-advisory" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00077.html" }, { "name": "[debian-lts-announce] 20230831 [SECURITY] [DLA 3551-1] otrs2 security update", "tags": [ "mailing-list" ], "url": "https://lists.debian.org/debian-lts-announce/2023/08/msg00040.html" } ], "solutions": [ { "lang": "en", "value": "Upgrade to OTRS 7.0.16, ((OTRS)) Community Edition 6.0.27\n\nPatch for ((OTRS)) Community Edition 6: https://github.com/OTRS/otrs/commit/2576830053f70a3a9251558e55f34843dec61aa2" } ], "source": { "advisory": "OSA-2020-08", "defect": [ "2020022642002875" ], "discovery": "EXTERNAL" }, "title": "Possible XSS in Customer user address book", "x_generator": { "engine": "Vulnogram 0.0.9" } } }, "cveMetadata": { "assignerOrgId": "2e1bf29f-dc29-4ed8-830c-7b9348b6f0e8", "assignerShortName": "OTRS", "cveId": "CVE-2020-1771", "datePublished": "2020-03-27T12:47:49.462891Z", "dateReserved": "2019-11-29T00:00:00", "dateUpdated": "2024-09-17T03:28:52.085Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2021-21441
Vulnerability from cvelistv5
Published
2021-06-16 09:50
Modified
2024-09-16 16:23
Severity ?
EPSS score ?
Summary
XSS in the ticket overview screens
References
Impacted products
Vendor | Product | Version | |||||
---|---|---|---|---|---|---|---|
▼ | OTRS AG | ((OTRS)) Community Edition |
Version: 6.0.1 < 6.0.x* |
||||
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T18:16:22.242Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://otrs.com/release-notes/otrs-security-advisory-2021-11/" }, { "name": "[debian-lts-announce] 20230831 [SECURITY] [DLA 3551-1] otrs2 security update", "tags": [ "mailing-list", "x_transferred" ], "url": "https://lists.debian.org/debian-lts-announce/2023/08/msg00040.html" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "((OTRS)) Community Edition", "vendor": "OTRS AG", "versions": [ { "lessThan": "6.0.x*", "status": "affected", "version": "6.0.1", "versionType": "custom" } ] }, { "product": "OTRS", "vendor": "OTRS AG", "versions": [ { "lessThanOrEqual": "7.0.26", "status": "affected", "version": "7.0.x", "versionType": "custom" } ] } ], "datePublic": "2021-06-16T00:00:00", "descriptions": [ { "lang": "en", "value": "There is a XSS vulnerability in the ticket overview screens. It\u0027s possible to collect various information by having an e-mail shown in the overview screen. Attack can be performed by sending specially crafted e-mail to the system and it doesn\u0027t require any user intraction. This issue affects: OTRS AG ((OTRS)) Community Edition 6.0.x version 6.0.1 and later versions. OTRS AG OTRS 7.0.x version 7.0.26 and prior versions." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-79", "description": "CWE-79 Cross-site Scripting (XSS)", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2023-08-31T02:06:27.744989", "orgId": "2e1bf29f-dc29-4ed8-830c-7b9348b6f0e8", "shortName": "OTRS" }, "references": [ { "url": "https://otrs.com/release-notes/otrs-security-advisory-2021-11/" }, { "name": "[debian-lts-announce] 20230831 [SECURITY] [DLA 3551-1] otrs2 security update", "tags": [ "mailing-list" ], "url": "https://lists.debian.org/debian-lts-announce/2023/08/msg00040.html" } ], "solutions": [ { "lang": "en", "value": "Update to OTRS 7.0.27." } ], "source": { "advisory": "OSA-2021-11", "defect": [ "2021042142004313" ], "discovery": "EXTERNAL" }, "title": "XSS in the ticket overview screens", "x_generator": { "engine": "Vulnogram 0.0.9" } } }, "cveMetadata": { "assignerOrgId": "2e1bf29f-dc29-4ed8-830c-7b9348b6f0e8", "assignerShortName": "OTRS", "cveId": "CVE-2021-21441", "datePublished": "2021-06-16T09:50:11.263977Z", "dateReserved": "2020-12-29T00:00:00", "dateUpdated": "2024-09-16T16:23:02.452Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2021-36096
Vulnerability from cvelistv5
Published
2021-09-06 14:50
Modified
2024-09-16 18:34
Severity ?
EPSS score ?
Summary
Support Bundle includes S/Mime and PGP secret or PIN
References
▼ | URL | Tags |
---|---|---|
https://otrs.com/release-notes/otrs-security-advisory-2021-10/ | x_refsource_CONFIRM |
Impacted products
Vendor | Product | Version | |||||
---|---|---|---|---|---|---|---|
▼ | OTRS AG | ((OTRS)) Community Edition |
Version: 6.0.1 < 6.0.x* |
||||
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T00:47:43.808Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://otrs.com/release-notes/otrs-security-advisory-2021-10/" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "((OTRS)) Community Edition", "vendor": "OTRS AG", "versions": [ { "lessThan": "6.0.x*", "status": "affected", "version": "6.0.1", "versionType": "custom" } ] }, { "product": "OTRS", "vendor": "OTRS AG", "versions": [ { "lessThanOrEqual": "7.0.28", "status": "affected", "version": "7.0.x", "versionType": "custom" }, { "lessThanOrEqual": "8.0.15", "status": "affected", "version": "8.0.x", "versionType": "custom" } ] } ], "credits": [ { "lang": "en", "value": "Matthias Terlinde" } ], "datePublic": "2021-09-06T00:00:00", "descriptions": [ { "lang": "en", "value": "Generated Support Bundles contains private S/MIME and PGP keys if containing folder is not hidden. This issue affects: OTRS AG ((OTRS)) Community Edition 6.0.x version 6.0.1 and later versions. OTRS AG OTRS 7.0.x version 7.0.28 and prior versions; 8.0.x version 8.0.15 and prior versions." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.2, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "LOW", "privilegesRequired": "HIGH", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:U/C:H/I:L/A:N", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-200", "description": "CWE-200 Information Exposure", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2021-09-06T14:50:11", "orgId": "2e1bf29f-dc29-4ed8-830c-7b9348b6f0e8", "shortName": "OTRS" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "https://otrs.com/release-notes/otrs-security-advisory-2021-10/" } ], "solutions": [ { "lang": "en", "value": "Update to OTRS 8.0.16 or OTRS 7.0.29." } ], "source": { "advisory": "OSA-2021-10", "defect": [ "2021050342000331", "2021072642001436" ], "discovery": "USER" }, "title": "Support Bundle includes S/Mime and PGP secret or PIN", "x_generator": { "engine": "Vulnogram 0.0.9" }, "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "security@otrs.com", "DATE_PUBLIC": "2021-09-06T00:00:00.000Z", "ID": "CVE-2021-36096", "STATE": "PUBLIC", "TITLE": "Support Bundle includes S/Mime and PGP secret or PIN" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "((OTRS)) Community Edition", "version": { "version_data": [ { "version_affected": "\u003e=", "version_name": "6.0.x", "version_value": "6.0.1" } ] } }, { "product_name": "OTRS", "version": { "version_data": [ { "version_affected": "\u003c=", "version_name": "7.0.x", "version_value": "7.0.28" }, { "version_affected": "\u003c=", "version_name": "8.0.x", "version_value": "8.0.15" } ] } } ] }, "vendor_name": "OTRS AG" } ] } }, "credit": [ { "lang": "eng", "value": "Matthias Terlinde" } ], "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Generated Support Bundles contains private S/MIME and PGP keys if containing folder is not hidden. This issue affects: OTRS AG ((OTRS)) Community Edition 6.0.x version 6.0.1 and later versions. OTRS AG OTRS 7.0.x version 7.0.28 and prior versions; 8.0.x version 8.0.15 and prior versions." } ] }, "generator": { "engine": "Vulnogram 0.0.9" }, "impact": { "cvss": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.2, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "LOW", "privilegesRequired": "HIGH", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:U/C:H/I:L/A:N", "version": "3.1" } }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "CWE-200 Information Exposure" } ] } ] }, "references": { "reference_data": [ { "name": "https://otrs.com/release-notes/otrs-security-advisory-2021-10/", "refsource": "CONFIRM", "url": "https://otrs.com/release-notes/otrs-security-advisory-2021-10/" } ] }, "solution": [ { "lang": "en", "value": "Update to OTRS 8.0.16 or OTRS 7.0.29." } ], "source": { "advisory": "OSA-2021-10", "defect": [ "2021050342000331", "2021072642001436" ], "discovery": "USER" } } } }, "cveMetadata": { "assignerOrgId": "2e1bf29f-dc29-4ed8-830c-7b9348b6f0e8", "assignerShortName": "OTRS", "cveId": "CVE-2021-36096", "datePublished": "2021-09-06T14:50:11.706653Z", "dateReserved": "2021-07-01T00:00:00", "dateUpdated": "2024-09-16T18:34:20.846Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2022-4427
Vulnerability from cvelistv5
Published
2022-12-19 08:09
Modified
2024-08-03 01:41
Severity ?
EPSS score ?
Summary
SQL Injection via OTRS Search API
References
Impacted products
Vendor | Product | Version | |||||
---|---|---|---|---|---|---|---|
▼ | OTRS AG | OTRS |
Version: 7.0.1 Version: 8.0.1 |
||||
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T01:41:44.619Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://otrs.com/release-notes/otrs-security-advisory-2022-15/" }, { "tags": [ "x_transferred" ], "url": "https://lists.debian.org/debian-lts-announce/2023/08/msg00040.html" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "defaultStatus": "affected", "modules": [ "Generic Interface" ], "product": "OTRS", "vendor": "OTRS AG", "versions": [ { "lessThan": "7.0.40 Patch 1", "status": "affected", "version": "7.0.1", "versionType": "Patch 1 (2022-12-19)" }, { "lessThan": "8.0.28 Patch 1", "status": "affected", "version": "8.0.1", "versionType": "Patch 1 (2022-12-19)" } ] }, { "defaultStatus": "affected", "modules": [ "Generic Interface" ], "product": "((OTRS)) Community Edition", "vendor": "OTRS AG", "versions": [ { "lessThanOrEqual": "6.0.34", "status": "affected", "version": "6.0.1", "versionType": "All" } ] } ], "configurations": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "TicketSearch Webservice has to be configured\u003cbr\u003e" } ], "value": "TicketSearch Webservice has to be configured\n" } ], "credits": [ { "lang": "en", "type": "reporter", "user": "00000000-0000-4000-9000-000000000000", "value": "Special thanks to Tim P\u00fcttmanns for reporting these vulnerability." } ], "datePublic": "2022-12-19T08:00:00.000Z", "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "Improper Input Validation vulnerability in OTRS AG OTRS, OTRS AG ((OTRS)) Community Edition allows SQL Injection via TicketSearch Webservice\u003cbr\u003e\u003cp\u003eThis issue affects OTRS: from 7.0.1 before 7.0.40 Patch 1, from 8.0.1 before 8.0.28 Patch 1; ((OTRS)) Community Edition: from 6.0.1 through 6.0.34.\u003c/p\u003e" } ], "value": "Improper Input Validation vulnerability in OTRS AG OTRS, OTRS AG ((OTRS)) Community Edition allows SQL Injection via TicketSearch Webservice\nThis issue affects OTRS: from 7.0.1 before 7.0.40 Patch 1, from 8.0.1 before 8.0.28 Patch 1; ((OTRS)) Community Edition: from 6.0.1 through 6.0.34.\n\n" } ], "impacts": [ { "capecId": "CAPEC-66", "descriptions": [ { "lang": "en", "value": "CAPEC-66 SQL Injection" } ] } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-20", "description": "CWE-20 Improper Input Validation", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2022-12-19T08:09:51.646Z", "orgId": "2e1bf29f-dc29-4ed8-830c-7b9348b6f0e8", "shortName": "OTRS" }, "references": [ { "url": "https://otrs.com/release-notes/otrs-security-advisory-2022-15/" }, { "url": "https://lists.debian.org/debian-lts-announce/2023/08/msg00040.html" } ], "solutions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "Update to OTRS 7.0.40 Patch 1 or OTRS 8.0.28 Patch 1 released on 19th December 2022\u003cbr\u003e" } ], "value": "Update to OTRS 7.0.40 Patch 1 or OTRS 8.0.28 Patch 1 released on 19th December 2022\n" } ], "source": { "advisory": "OSA-2022-15", "discovery": "EXTERNAL" }, "title": "SQL Injection via OTRS Search API", "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "2e1bf29f-dc29-4ed8-830c-7b9348b6f0e8", "assignerShortName": "OTRS", "cveId": "CVE-2022-4427", "datePublished": "2022-12-19T08:09:51.646Z", "dateReserved": "2022-12-12T16:11:40.741Z", "dateUpdated": "2024-08-03T01:41:44.619Z", "requesterUserId": "e1930910-48a6-4f4e-9306-261ea8c0e8b1", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2022-39050
Vulnerability from cvelistv5
Published
2022-09-05 06:40
Modified
2024-09-16 19:24
Severity ?
EPSS score ?
Summary
Possible XSS stored in customer information
References
▼ | URL | Tags |
---|---|---|
https://otrs.com/release-notes/otrs-security-advisory-2022-11/ | x_refsource_CONFIRM |
Impacted products
Vendor | Product | Version | |||||
---|---|---|---|---|---|---|---|
▼ | OTRS AG | OTRS |
Version: 7.0.x < Version: 8.0.x < |
||||
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T11:10:32.447Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://otrs.com/release-notes/otrs-security-advisory-2022-11/" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "OTRS", "vendor": "OTRS AG", "versions": [ { "lessThanOrEqual": "7.0.36", "status": "affected", "version": "7.0.x", "versionType": "custom" }, { "lessThanOrEqual": "8.0.24", "status": "affected", "version": "8.0.x", "versionType": "custom" } ] }, { "product": "((OTRS)) Community Edition", "vendor": "OTRS AG", "versions": [ { "lessThan": "6.0.x*", "status": "affected", "version": "6.0.1", "versionType": "custom" } ] } ], "credits": [ { "lang": "en", "value": "Special thanks to Aleksey Solovev for reporting these vulnerability." } ], "datePublic": "2022-09-05T00:00:00", "descriptions": [ { "lang": "en", "value": "An attacker who is logged into OTRS as an admin user may manipulate customer URL field to store JavaScript code to be run later by any other agent when clicking the customer URL link. Then the stored JavaScript is executed in the context of OTRS. The same issue applies for the usage of external data sources e.g. database or ldap" } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 4.6, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:L/I:L/A:N", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-79", "description": "CWE-79 Cross-site Scripting (XSS)", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2022-09-05T06:40:11", "orgId": "2e1bf29f-dc29-4ed8-830c-7b9348b6f0e8", "shortName": "OTRS" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "https://otrs.com/release-notes/otrs-security-advisory-2022-11/" } ], "solutions": [ { "lang": "en", "value": "Update to OTRS 7.0.37 or OTRS 8.0.25." } ], "source": { "advisory": "OSA-2022-11", "defect": [ "2022062842001012" ], "discovery": "EXTERNAL" }, "title": "Possible XSS stored in customer information", "x_generator": { "engine": "Vulnogram 0.0.9" }, "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "security@otrs.com", "DATE_PUBLIC": "2022-09-05T07:00:00.000Z", "ID": "CVE-2022-39050", "STATE": "PUBLIC", "TITLE": "Possible XSS stored in customer information" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "OTRS", "version": { "version_data": [ { "version_affected": "\u003c=", "version_name": "7.0.x", "version_value": "7.0.36" }, { "version_affected": "\u003c=", "version_name": "8.0.x", "version_value": "8.0.24" } ] } }, { "product_name": "((OTRS)) Community Edition", "version": { "version_data": [ { "version_affected": "\u003e=", "version_name": "6.0.x", "version_value": "6.0.1" } ] } } ] }, "vendor_name": "OTRS AG" } ] } }, "credit": [ { "lang": "eng", "value": "Special thanks to Aleksey Solovev for reporting these vulnerability." } ], "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "An attacker who is logged into OTRS as an admin user may manipulate customer URL field to store JavaScript code to be run later by any other agent when clicking the customer URL link. Then the stored JavaScript is executed in the context of OTRS. The same issue applies for the usage of external data sources e.g. database or ldap" } ] }, "generator": { "engine": "Vulnogram 0.0.9" }, "impact": { "cvss": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 4.6, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:L/I:L/A:N", "version": "3.1" } }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "CWE-79 Cross-site Scripting (XSS)" } ] } ] }, "references": { "reference_data": [ { "name": "https://otrs.com/release-notes/otrs-security-advisory-2022-11/", "refsource": "CONFIRM", "url": "https://otrs.com/release-notes/otrs-security-advisory-2022-11/" } ] }, "solution": [ { "lang": "en", "value": "Update to OTRS 7.0.37 or OTRS 8.0.25." } ], "source": { "advisory": "OSA-2022-11", "defect": [ "2022062842001012" ], "discovery": "EXTERNAL" } } } }, "cveMetadata": { "assignerOrgId": "2e1bf29f-dc29-4ed8-830c-7b9348b6f0e8", "assignerShortName": "OTRS", "cveId": "CVE-2022-39050", "datePublished": "2022-09-05T06:40:11.972213Z", "dateReserved": "2022-08-31T00:00:00", "dateUpdated": "2024-09-16T19:24:11.199Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2020-1774
Vulnerability from cvelistv5
Published
2020-04-28 13:54
Modified
2024-09-16 18:13
Severity ?
EPSS score ?
Summary
Information disclosure
References
Impacted products
Vendor | Product | Version | |||||
---|---|---|---|---|---|---|---|
▼ | OTRS AG | ((OTRS)) Community Edition |
Version: 6.0.x <= 6.0.27 Version: 5.0.x <= 5.0.42 |
||||
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T06:46:30.951Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://otrs.com/release-notes/otrs-security-advisory-2020-11/" }, { "name": "[debian-lts-announce] 20200501 [SECURITY] [DLA 2198-1] otrs2 security update", "tags": [ "mailing-list", "x_transferred" ], "url": "https://lists.debian.org/debian-lts-announce/2020/05/msg00000.html" }, { "name": "[debian-lts-announce] 20230831 [SECURITY] [DLA 3551-1] otrs2 security update", "tags": [ "mailing-list", "x_transferred" ], "url": "https://lists.debian.org/debian-lts-announce/2023/08/msg00040.html" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "((OTRS)) Community Edition", "vendor": "OTRS AG", "versions": [ { "status": "affected", "version": "6.0.x \u003c= 6.0.27" }, { "status": "affected", "version": "5.0.x \u003c= 5.0.42" } ] }, { "product": "OTRS", "vendor": "OTRS AG", "versions": [ { "status": "affected", "version": "7.0.x \u003c= 7.0.16" } ] } ], "credits": [ { "lang": "en", "value": "Matthias Terlinde" } ], "datePublic": "2020-04-27T00:00:00", "descriptions": [ { "lang": "en", "value": "When user downloads PGP or S/MIME keys/certificates, exported file has same name for private and public keys. Therefore it\u0027s possible to mix them and to send private key to the third-party instead of public key. This issue affects ((OTRS)) Community Edition: 5.0.42 and prior versions, 6.0.27 and prior versions. OTRS: 7.0.16 and prior versions." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 4.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "HIGH", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:U/C:H/I:N/A:N", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-201", "description": "CWE-201 Information Exposure Through Sent Data", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2023-08-31T02:07:06.193689", "orgId": "2e1bf29f-dc29-4ed8-830c-7b9348b6f0e8", "shortName": "OTRS" }, "references": [ { "url": "https://otrs.com/release-notes/otrs-security-advisory-2020-11/" }, { "name": "[debian-lts-announce] 20200501 [SECURITY] [DLA 2198-1] otrs2 security update", "tags": [ "mailing-list" ], "url": "https://lists.debian.org/debian-lts-announce/2020/05/msg00000.html" }, { "name": "[debian-lts-announce] 20230831 [SECURITY] [DLA 3551-1] otrs2 security update", "tags": [ "mailing-list" ], "url": "https://lists.debian.org/debian-lts-announce/2023/08/msg00040.html" } ], "solutions": [ { "lang": "en", "value": "Upgrade to OTRS 7.0.17, ((OTRS)) Community Edition 6.0.28\nPatch for ((OTRS)) Community Edition 6: https://github.com/OTRS/otrs/commit/ff725cbea77f03fa296bb13f93f5b07086920342\nPatch for ((OTRS)) Community Edition 5: https://github.com/OTRS/otrs/commit/fb0e6131e79aa2ba9c7acbd16f4ee4e73289f64b" } ], "source": { "advisory": "OSA-2020-11", "defect": [ "2020021442001602" ], "discovery": "USER" }, "title": "Information disclosure", "x_generator": { "engine": "Vulnogram 0.0.9" } } }, "cveMetadata": { "assignerOrgId": "2e1bf29f-dc29-4ed8-830c-7b9348b6f0e8", "assignerShortName": "OTRS", "cveId": "CVE-2020-1774", "datePublished": "2020-04-28T13:54:26.180850Z", "dateReserved": "2019-11-29T00:00:00", "dateUpdated": "2024-09-16T18:13:37.691Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2023-1248
Vulnerability from cvelistv5
Published
2023-03-20 08:19
Modified
2024-08-02 05:40
Severity ?
EPSS score ?
Summary
Possible XSS in Ticket Actions
References
Impacted products
Vendor | Product | Version | |||||
---|---|---|---|---|---|---|---|
▼ | OTRS AG | OTRS |
Version: 7.0.x |
||||
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T05:40:59.638Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://otrs.com/release-notes/otrs-security-advisory-2023-01/" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "defaultStatus": "affected", "modules": [ "Ticket Actions" ], "product": "OTRS", "vendor": "OTRS AG", "versions": [ { "lessThan": "7.0.42", "status": "affected", "version": "7.0.x", "versionType": "Patch" } ] }, { "defaultStatus": "affected", "modules": [ "Ticket Actions" ], "product": "((OTRS)) Community Edition", "vendor": "OTRS AG", "versions": [ { "lessThanOrEqual": "6.0.34", "status": "affected", "version": "6.0.1", "versionType": "All" } ] } ], "datePublic": "2023-03-20T07:00:00.000Z", "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "Improper Input Validation vulnerability in OTRS AG OTRS (Ticket Actions modules), OTRS AG ((OTRS)) Community Edition (Ticket Actions modules) allows Cross-Site Scripting (XSS).\u003cp\u003eThis issue affects OTRS: from 7.0.X before 7.0.42; ((OTRS)) Community Edition: from 6.0.1 through 6.0.34.\u003c/p\u003e" } ], "value": "Improper Input Validation vulnerability in OTRS AG OTRS (Ticket Actions modules), OTRS AG ((OTRS)) Community Edition (Ticket Actions modules) allows Cross-Site Scripting (XSS).This issue affects OTRS: from 7.0.X before 7.0.42; ((OTRS)) Community Edition: from 6.0.1 through 6.0.34.\n\n" } ], "impacts": [ { "capecId": "CAPEC-63", "descriptions": [ { "lang": "en", "value": "CAPEC-63 Cross-Site Scripting (XSS)" } ] } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.1, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-79", "description": "CWE-79 Improper Neutralization of Input During Web Page Generation (\u0027Cross-site Scripting\u0027)", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2023-03-20T08:20:17.212Z", "orgId": "2e1bf29f-dc29-4ed8-830c-7b9348b6f0e8", "shortName": "OTRS" }, "references": [ { "url": "https://otrs.com/release-notes/otrs-security-advisory-2023-01/" } ], "solutions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "\nUpdate to OTRS 7.0.42\u003cbr\u003e" } ], "value": "Update to OTRS 7.0.42\n" } ], "source": { "advisory": "OSA-2023-01", "defect": [ "364" ], "discovery": "USER" }, "title": " Possible XSS in Ticket Actions", "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "2e1bf29f-dc29-4ed8-830c-7b9348b6f0e8", "assignerShortName": "OTRS", "cveId": "CVE-2023-1248", "datePublished": "2023-03-20T08:19:34.182Z", "dateReserved": "2023-03-07T09:06:22.435Z", "dateUpdated": "2024-08-02T05:40:59.638Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2022-39052
Vulnerability from cvelistv5
Published
2022-10-17 08:55
Modified
2024-09-16 18:33
Severity ?
EPSS score ?
Summary
DoS attack using email
References
Impacted products
Vendor | Product | Version | |||||
---|---|---|---|---|---|---|---|
▼ | OTRS AG | OTRS |
Version: 7.0.x < Version: 8.0.x < |
||||
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T11:10:32.409Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://otrs.com/release-notes/otrs-security-advisory-2022-13/" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "OTRS", "vendor": "OTRS AG", "versions": [ { "lessThanOrEqual": "7.0.39", "status": "affected", "version": "7.0.x", "versionType": "custom" }, { "lessThanOrEqual": "8.0.26", "status": "affected", "version": "8.0.x", "versionType": "custom" } ] }, { "product": "((OTRS)) Community Edition", "vendor": "OTRS AG", "versions": [ { "lessThan": "6.0.x*", "status": "affected", "version": "6.0.1", "versionType": "custom" } ] } ], "datePublic": "2022-10-17T00:00:00", "descriptions": [ { "lang": "en", "value": "An external attacker is able to send a specially crafted email (with many recipients) and trigger a potential DoS of the system" } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-835", "description": "CWE-835 Loop with Unreachable Exit Condition (\u0027Infinite Loop\u0027)", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2022-10-17T00:00:00", "orgId": "2e1bf29f-dc29-4ed8-830c-7b9348b6f0e8", "shortName": "OTRS" }, "references": [ { "url": "https://otrs.com/release-notes/otrs-security-advisory-2022-13/" } ], "solutions": [ { "lang": "en", "value": "Update to OTRS 8.0.26 or OTRS 7.0.38." } ], "source": { "advisory": "OSA-2022-13", "defect": [ "2022070642001105" ], "discovery": "USER" }, "title": "DoS attack using email", "x_generator": { "engine": "vulnogram 0.1.0-rc1" } } }, "cveMetadata": { "assignerOrgId": "2e1bf29f-dc29-4ed8-830c-7b9348b6f0e8", "assignerShortName": "OTRS", "cveId": "CVE-2022-39052", "datePublished": "2022-10-17T08:55:10.047405Z", "dateReserved": "2022-08-31T00:00:00", "dateUpdated": "2024-09-16T18:33:43.971Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2020-1766
Vulnerability from cvelistv5
Published
2020-01-10 15:08
Modified
2024-09-17 00:10
Severity ?
EPSS score ?
Summary
Improper handling of uploaded inline images
References
Impacted products
Vendor | Product | Version | |||||
---|---|---|---|---|---|---|---|
▼ | OTRS AG | ((OTRS)) Community Edition |
Version: 5.0.x version 5.0.39 and prior versions Version: 6.0.x version 6.0.24 and prior versions |
||||
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T06:46:30.931Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://otrs.com/release-notes/otrs-security-advisory-2020-02/" }, { "name": "[debian-lts-announce] 20200129 [SECURITY] [DLA 2079-1] otrs2 security update", "tags": [ "mailing-list", "x_transferred" ], "url": "https://lists.debian.org/debian-lts-announce/2020/01/msg00027.html" }, { "name": "openSUSE-SU-2020:0551", "tags": [ "vendor-advisory", "x_transferred" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2020-04/msg00038.html" }, { "name": "openSUSE-SU-2020:1475", "tags": [ "vendor-advisory", "x_transferred" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00066.html" }, { "name": "openSUSE-SU-2020:1509", "tags": [ "vendor-advisory", "x_transferred" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00077.html" }, { "name": "[debian-lts-announce] 20230831 [SECURITY] [DLA 3551-1] otrs2 security update", "tags": [ "mailing-list", "x_transferred" ], "url": "https://lists.debian.org/debian-lts-announce/2023/08/msg00040.html" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "((OTRS)) Community Edition", "vendor": "OTRS AG", "versions": [ { "status": "affected", "version": "5.0.x version 5.0.39 and prior versions" }, { "status": "affected", "version": "6.0.x version 6.0.24 and prior versions" } ] }, { "product": "OTRS", "vendor": "OTRS AG", "versions": [ { "status": "affected", "version": "7.0.x version 7.0.13 and prior versions" } ] } ], "credits": [ { "lang": "en", "value": "Anton Astaf\u0027ev" } ], "datePublic": "2020-01-10T00:00:00", "descriptions": [ { "lang": "en", "value": "Due to improper handling of uploaded images it is possible in very unlikely and rare conditions to force the agents browser to execute malicious javascript from a special crafted SVG file rendered as inline jpg file. This issue affects: ((OTRS)) Community Edition 5.0.x version 5.0.39 and prior versions; 6.0.x version 6.0.24 and prior versions. OTRS 7.0.x version 7.0.13 and prior versions." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 2, "baseSeverity": "LOW", "confidentialityImpact": "NONE", "integrityImpact": "LOW", "privilegesRequired": "HIGH", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:H/UI:R/S:U/C:N/I:L/A:N", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-79", "description": "CWE-79 Cross-site Scripting (XSS)", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2023-08-31T02:06:59.708432", "orgId": "2e1bf29f-dc29-4ed8-830c-7b9348b6f0e8", "shortName": "OTRS" }, "references": [ { "url": "https://otrs.com/release-notes/otrs-security-advisory-2020-02/" }, { "name": "[debian-lts-announce] 20200129 [SECURITY] [DLA 2079-1] otrs2 security update", "tags": [ "mailing-list" ], "url": "https://lists.debian.org/debian-lts-announce/2020/01/msg00027.html" }, { "name": "openSUSE-SU-2020:0551", "tags": [ "vendor-advisory" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2020-04/msg00038.html" }, { "name": "openSUSE-SU-2020:1475", "tags": [ "vendor-advisory" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00066.html" }, { "name": "openSUSE-SU-2020:1509", "tags": [ "vendor-advisory" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00077.html" }, { "name": "[debian-lts-announce] 20230831 [SECURITY] [DLA 3551-1] otrs2 security update", "tags": [ "mailing-list" ], "url": "https://lists.debian.org/debian-lts-announce/2023/08/msg00040.html" } ], "solutions": [ { "lang": "en", "value": "Upgrade to OTRS 7.0.14, ((OTRS)) Community Edition 6.0.25, ((OTRS)) Community Edition 5.0.40" }, { "lang": "en", "value": "Patch for ((OTRS)) Community Edition 6: https://github.com/OTRS/otrs/commit/128078b0bb30f601ed97d4a13906644264ee6013 \nPatch for ((OTRS)) Community Edition 5: https://github.com/OTRS/otrs/commit/b7d80f9000fc9a435743d8d1d7d44d9a17483a9a" } ], "source": { "advisory": "OSA-2020-02", "defect": [ "2019112942001838" ], "discovery": "EXTERNAL" }, "title": "Improper handling of uploaded inline images", "x_generator": { "engine": "Vulnogram 0.0.9" } } }, "cveMetadata": { "assignerOrgId": "2e1bf29f-dc29-4ed8-830c-7b9348b6f0e8", "assignerShortName": "OTRS", "cveId": "CVE-2020-1766", "datePublished": "2020-01-10T15:08:57.704919Z", "dateReserved": "2019-11-29T00:00:00", "dateUpdated": "2024-09-17T00:10:59.231Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2021-21439
Vulnerability from cvelistv5
Published
2021-06-14 07:55
Modified
2024-09-16 19:52
Severity ?
EPSS score ?
Summary
Possible DoS attack using a special crafted URL in email body
References
Impacted products
Vendor | Product | Version | |||||
---|---|---|---|---|---|---|---|
▼ | OTRS AG | ((OTRS)) Community Edition |
Version: 6.0.1 < 6.0.x* |
||||
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T18:16:22.212Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://otrs.com/release-notes/otrs-security-advisory-2021-09/" }, { "name": "[debian-lts-announce] 20230831 [SECURITY] [DLA 3551-1] otrs2 security update", "tags": [ "mailing-list", "x_transferred" ], "url": "https://lists.debian.org/debian-lts-announce/2023/08/msg00040.html" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "((OTRS)) Community Edition", "vendor": "OTRS AG", "versions": [ { "lessThan": "6.0.x*", "status": "affected", "version": "6.0.1", "versionType": "custom" } ] }, { "product": "OTRS", "vendor": "OTRS AG", "versions": [ { "lessThanOrEqual": "7.0.26", "status": "affected", "version": "7.0.x", "versionType": "custom" }, { "lessThanOrEqual": "8.0.13", "status": "affected", "version": "8.0.x", "versionType": "custom" } ] } ], "datePublic": "2021-06-14T00:00:00", "descriptions": [ { "lang": "en", "value": "DoS attack can be performed when an email contains specially designed URL in the body. It can lead to the high CPU usage and cause low quality of service, or in extreme case bring the system to a halt. This issue affects: OTRS AG ((OTRS)) Community Edition 6.0.x version 6.0.1 and later versions. OTRS AG OTRS 7.0.x version 7.0.26 and prior versions; 8.0.x version 8.0.13 and prior versions." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-754", "description": "CWE-754: Improper Check for Unusual or Exceptional Conditions", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2023-08-31T02:06:20.978358", "orgId": "2e1bf29f-dc29-4ed8-830c-7b9348b6f0e8", "shortName": "OTRS" }, "references": [ { "url": "https://otrs.com/release-notes/otrs-security-advisory-2021-09/" }, { "name": "[debian-lts-announce] 20230831 [SECURITY] [DLA 3551-1] otrs2 security update", "tags": [ "mailing-list" ], "url": "https://lists.debian.org/debian-lts-announce/2023/08/msg00040.html" } ], "solutions": [ { "lang": "en", "value": "Update to OTRS 8.0.14 or OTRS 7.0.27." } ], "source": { "advisory": "OSA-2021-09", "defect": [ "2021031142000285" ], "discovery": "USER" }, "title": "Possible DoS attack using a special crafted URL in email body", "x_generator": { "engine": "Vulnogram 0.0.9" } } }, "cveMetadata": { "assignerOrgId": "2e1bf29f-dc29-4ed8-830c-7b9348b6f0e8", "assignerShortName": "OTRS", "cveId": "CVE-2021-21439", "datePublished": "2021-06-14T07:55:10.080008Z", "dateReserved": "2020-12-29T00:00:00", "dateUpdated": "2024-09-16T19:52:22.948Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2023-38056
Vulnerability from cvelistv5
Published
2023-07-24 08:27
Modified
2024-10-23 17:49
Severity ?
EPSS score ?
Summary
Code execution via System Configuration
References
Impacted products
Vendor | Product | Version | |||||
---|---|---|---|---|---|---|---|
▼ | OTRS AG | OTRS |
Version: 7.0.x Version: 8.0.x |
||||
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T17:30:12.960Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://otrs.com/release-notes/otrs-security-advisory-2023-05/" } ], "title": "CVE Program Container" }, { "metrics": [ { "other": { "content": { "id": "CVE-2023-38056", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "total" } ], "role": "CISA Coordinator", "timestamp": "2024-10-23T17:47:42.741098Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-10-23T17:49:19.541Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "affected", "modules": [ "System Configuration", "UnitTests" ], "product": "OTRS", "vendor": "OTRS AG", "versions": [ { "lessThan": "7.0.45", "status": "affected", "version": "7.0.x", "versionType": "Patch" }, { "lessThan": "8.0.35", "status": "affected", "version": "8.0.x", "versionType": "Patch" } ] }, { "defaultStatus": "affected", "product": "((OTRS)) Community Edition", "vendor": "OTRS AG", "versions": [ { "lessThanOrEqual": "6.0.34", "status": "affected", "version": "6.0.1", "versionType": "All" } ] } ], "credits": [ { "lang": "en", "type": "finder", "user": "00000000-0000-4000-9000-000000000000", "value": "Special thanks to Tim P\u00fcttmanns for reporting these vulnerability." } ], "datePublic": "2023-07-24T07:00:00.000Z", "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "Improper Neutralization of commands allowed to be executed via OTRS System Configuration e.g. SchedulerCronTaskModule using UnitTests modules allows any authenticated attacker with admin privileges local execution of Code.\u003cp\u003eThis issue affects OTRS: from 7.0.X before 7.0.45, from 8.0.X before 8.0.35; ((OTRS)) Community Edition: from 6.0.1 through 6.0.34.\u003c/p\u003e" } ], "value": "Improper Neutralization of commands allowed to be executed via OTRS System Configuration e.g. SchedulerCronTaskModule using UnitTests modules allows any authenticated attacker with admin privileges local execution of Code.This issue affects OTRS: from 7.0.X before 7.0.45, from 8.0.X before 8.0.35; ((OTRS)) Community Edition: from 6.0.1 through 6.0.34.\n\n" } ], "impacts": [ { "capecId": "CAPEC-549", "descriptions": [ { "lang": "en", "value": "CAPEC-549 Local Execution of Code" } ] } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.2, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "HIGH", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-78", "description": "CWE-78 Improper Neutralization of Special Elements used in an OS Command (\u0027OS Command Injection\u0027)", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2023-07-24T08:27:26.270Z", "orgId": "2e1bf29f-dc29-4ed8-830c-7b9348b6f0e8", "shortName": "OTRS" }, "references": [ { "url": "https://otrs.com/release-notes/otrs-security-advisory-2023-05/" } ], "solutions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "Update to OTRS 8.0.35 or OTRS 7.0.45\u003cbr\u003e" } ], "value": "Update to OTRS 8.0.35 or OTRS 7.0.45\n" } ], "source": { "advisory": "OSA-2023-05", "defect": [ "1025", "Ticket#2023041142000636" ], "discovery": "EXTERNAL" }, "title": "Code execution via System Configuration ", "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "2e1bf29f-dc29-4ed8-830c-7b9348b6f0e8", "assignerShortName": "OTRS", "cveId": "CVE-2023-38056", "datePublished": "2023-07-24T08:27:13.127Z", "dateReserved": "2023-07-12T08:05:38.780Z", "dateUpdated": "2024-10-23T17:49:19.541Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2020-1770
Vulnerability from cvelistv5
Published
2020-03-27 12:47
Modified
2024-09-17 01:11
Severity ?
EPSS score ?
Summary
Information disclosure in support bundle files
References
Impacted products
Vendor | Product | Version | |||||
---|---|---|---|---|---|---|---|
▼ | OTRS AG | ((OTRS)) Community Edition |
Version: 5.0.x < Version: 6.0.x < |
||||
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T06:46:30.907Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://otrs.com/release-notes/otrs-security-advisory-2020-07/" }, { "name": "openSUSE-SU-2020:0551", "tags": [ "vendor-advisory", "x_transferred" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2020-04/msg00038.html" }, { "name": "[debian-lts-announce] 20200501 [SECURITY] [DLA 2198-1] otrs2 security update", "tags": [ "mailing-list", "x_transferred" ], "url": "https://lists.debian.org/debian-lts-announce/2020/05/msg00000.html" }, { "name": "openSUSE-SU-2020:1475", "tags": [ "vendor-advisory", "x_transferred" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00066.html" }, { "name": "openSUSE-SU-2020:1509", "tags": [ "vendor-advisory", "x_transferred" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00077.html" }, { "name": "[debian-lts-announce] 20230831 [SECURITY] [DLA 3551-1] otrs2 security update", "tags": [ "mailing-list", "x_transferred" ], "url": "https://lists.debian.org/debian-lts-announce/2023/08/msg00040.html" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "((OTRS)) Community Edition", "vendor": "OTRS AG", "versions": [ { "lessThanOrEqual": "5.0.41", "status": "affected", "version": "5.0.x", "versionType": "custom" }, { "lessThanOrEqual": "6.0.26", "status": "affected", "version": "6.0.x", "versionType": "custom" } ] }, { "product": "OTRS", "vendor": "OTRS AG", "versions": [ { "lessThanOrEqual": "7.0.15", "status": "affected", "version": "7.0.x", "versionType": "custom" } ] } ], "credits": [ { "lang": "en", "value": "Matthias Terlinde" } ], "datePublic": "2020-03-27T00:00:00", "descriptions": [ { "lang": "en", "value": "Support bundle generated files could contain sensitive information that might be unwanted to be disclosed. This issue affects: ((OTRS)) Community Edition: 5.0.41 and prior versions, 6.0.26 and prior versions. OTRS: 7.0.15 and prior versions." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 2.4, "baseSeverity": "LOW", "confidentialityImpact": "LOW", "integrityImpact": "NONE", "privilegesRequired": "HIGH", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:U/C:L/I:N/A:N", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-201", "description": "CWE-201 Information Exposure Through Sent Data", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2023-08-31T02:06:22.490248", "orgId": "2e1bf29f-dc29-4ed8-830c-7b9348b6f0e8", "shortName": "OTRS" }, "references": [ { "url": "https://otrs.com/release-notes/otrs-security-advisory-2020-07/" }, { "name": "openSUSE-SU-2020:0551", "tags": [ "vendor-advisory" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2020-04/msg00038.html" }, { "name": "[debian-lts-announce] 20200501 [SECURITY] [DLA 2198-1] otrs2 security update", "tags": [ "mailing-list" ], "url": "https://lists.debian.org/debian-lts-announce/2020/05/msg00000.html" }, { "name": "openSUSE-SU-2020:1475", "tags": [ "vendor-advisory" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00066.html" }, { "name": "openSUSE-SU-2020:1509", "tags": [ "vendor-advisory" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00077.html" }, { "name": "[debian-lts-announce] 20230831 [SECURITY] [DLA 3551-1] otrs2 security update", "tags": [ "mailing-list" ], "url": "https://lists.debian.org/debian-lts-announce/2023/08/msg00040.html" } ], "solutions": [ { "lang": "en", "value": "Upgrade to OTRS 7.0.16, ((OTRS)) Community Edition 6.0.27, ((OTRS)) Community Edition 5.0.42.\n\nPatch for ((OTRS)) Community Edition 6: https://github.com/OTRS/otrs/commit/cb6d12a74fbf721ba33f24ce93ae37ed9a945a95\nPatch for ((OTRS)) Community Edition 5: https://github.com/OTRS/otrs/commit/d37defe6592992e886cc5cc8fec444d34875fd4d" } ], "source": { "advisory": "OSA-2020-07", "defect": [ "2020021442001997" ], "discovery": "USER" }, "title": "Information disclosure in support bundle files", "x_generator": { "engine": "Vulnogram 0.0.9" } } }, "cveMetadata": { "assignerOrgId": "2e1bf29f-dc29-4ed8-830c-7b9348b6f0e8", "assignerShortName": "OTRS", "cveId": "CVE-2020-1770", "datePublished": "2020-03-27T12:47:49.421305Z", "dateReserved": "2019-11-29T00:00:00", "dateUpdated": "2024-09-17T01:11:13.158Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2024-23793
Vulnerability from cvelistv5
Published
2024-06-06 18:06
Modified
2024-08-01 23:13
Severity ?
EPSS score ?
Summary
Upload of files outside application directory
References
Impacted products
Vendor | Product | Version | |||||
---|---|---|---|---|---|---|---|
▼ | OTRS AG | OTRS |
Version: 7.0.x Version: 8.0.x Version: 2023.x Version: 2024.x |
||||
|
{ "containers": { "adp": [ { "affected": [ { "cpes": [ "cpe:2.3:a:otrs:otrs:*:*:*:*:*:*:*:*" ], "defaultStatus": "affected", "product": "otrs", "vendor": "otrs", "versions": [ { "lessThan": "7.0.49", "status": "affected", "version": "7.0.x", "versionType": "custom" }, { "status": "affected", "version": "8.0.x" }, { "status": "affected", "version": "2023.x" }, { "lessThan": "2024.3.2", "status": "affected", "version": "2024.x", "versionType": "custom" } ] }, { "cpes": [ "cpe:2.3:a:otrs:otrs_community_edition:*:*:*:*:*:*:*:*" ], "defaultStatus": "affected", "product": "otrs_community_edition", "vendor": "otrs", "versions": [ { "lessThan": "6.0.34", "status": "affected", "version": "6.0.1", "versionType": "custom" } ] } ], "metrics": [ { "other": { "content": { "id": "CVE-2024-23793", "options": [ { "Exploitation": "poc" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-06-06T20:07:44.167335Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-06-06T20:22:49.508Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" }, { "providerMetadata": { "dateUpdated": "2024-08-01T23:13:07.327Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://otrs.com/release-notes/otrs-security-advisory-2024-05/" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "defaultStatus": "affected", "modules": [ "File Upload" ], "product": "OTRS", "vendor": "OTRS AG", "versions": [ { "lessThanOrEqual": "7.0.49", "status": "affected", "version": "7.0.x", "versionType": "Patch" }, { "status": "affected", "version": "8.0.x" }, { "status": "affected", "version": "2023.x" }, { "lessThanOrEqual": "2024.3.2", "status": "affected", "version": "2024.x", "versionType": "Patch" } ] }, { "defaultStatus": "affected", "product": "((OTRS)) Community Edition", "vendor": "OTRS AG", "versions": [ { "lessThanOrEqual": "6.0.34", "status": "affected", "version": "6.0.1", "versionType": "All" } ] } ], "datePublic": "2024-06-03T07:00:00.000Z", "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "The file upload feature in OTRS and ((OTRS)) Community Edition has a path traversal vulnerability. This issue permits authenticated agents or customer users to upload potentially harmful files to directories accessible by the web server, potentially leading to the execution of local code like Perl scripts.\u003cbr\u003e\u003cp\u003eThis issue affects OTRS: from 7.0.X through 7.0.49, 8.0.X, 2023.X, from 2024.X through 2024.3.2; ((OTRS)) Community Edition: from 6.0.1 through 6.0.34.\u003c/p\u003e" } ], "value": "The file upload feature in OTRS and ((OTRS)) Community Edition has a path traversal vulnerability. This issue permits authenticated agents or customer users to upload potentially harmful files to directories accessible by the web server, potentially leading to the execution of local code like Perl scripts.\nThis issue affects OTRS: from 7.0.X through 7.0.49, 8.0.X, 2023.X, from 2024.X through 2024.3.2; ((OTRS)) Community Edition: from 6.0.1 through 6.0.34.\n\n" } ], "impacts": [ { "capecId": "CAPEC-17", "descriptions": [ { "lang": "en", "value": "CAPEC-17 Using Malicious Files" } ] }, { "capecId": "CAPEC-549", "descriptions": [ { "lang": "en", "value": "CAPEC-549 Local Execution of Code" } ] } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "LOW", "baseScore": 6.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:H/A:L", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-22", "description": "CWE-22 Improper Limitation of a Pathname to a Restricted Directory (\u0027Path Traversal\u0027)", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-06-06T18:06:58.805Z", "orgId": "2e1bf29f-dc29-4ed8-830c-7b9348b6f0e8", "shortName": "OTRS" }, "references": [ { "url": "https://otrs.com/release-notes/otrs-security-advisory-2024-05/" } ], "solutions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "Update to OTRS\u0026nbsp;2024.4.3 or OTRS 7.0.50 (extended support only)\u003cbr\u003e" } ], "value": "Update to OTRS\u00a02024.4.3 or OTRS 7.0.50 (extended support only)\n" } ], "source": { "advisory": "OSA-2024-05", "defect": [ "Issue#2411" ], "discovery": "INTERNAL" }, "title": "Upload of files outside application directory", "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "2e1bf29f-dc29-4ed8-830c-7b9348b6f0e8", "assignerShortName": "OTRS", "cveId": "CVE-2024-23793", "datePublished": "2024-06-06T18:06:58.805Z", "dateReserved": "2024-01-22T10:32:00.704Z", "dateUpdated": "2024-08-01T23:13:07.327Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2021-36092
Vulnerability from cvelistv5
Published
2021-07-26 04:25
Modified
2024-09-17 03:02
Severity ?
EPSS score ?
Summary
XSS attack using special link in email
References
▼ | URL | Tags |
---|---|---|
https://otrs.com/release-notes/otrs-security-advisory-2021-15/ | x_refsource_CONFIRM |
Impacted products
Vendor | Product | Version | |||||
---|---|---|---|---|---|---|---|
▼ | OTRS AG | ((OTRS)) Community Edition |
Version: 6.0.1 < 6.0.x* |
||||
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T00:47:43.823Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://otrs.com/release-notes/otrs-security-advisory-2021-15/" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "((OTRS)) Community Edition", "vendor": "OTRS AG", "versions": [ { "lessThan": "6.0.x*", "status": "affected", "version": "6.0.1", "versionType": "custom" } ] }, { "product": "OTRS", "vendor": "OTRS AG", "versions": [ { "lessThanOrEqual": "7.0.27", "status": "affected", "version": "7.0.x", "versionType": "custom" }, { "lessThanOrEqual": "8.0.14", "status": "affected", "version": "8.0.x", "versionType": "custom" } ] } ], "datePublic": "2021-07-26T00:00:00", "descriptions": [ { "lang": "en", "value": "It\u0027s possible to create an email which contains specially crafted link and it can be used to perform XSS attack. This issue affects: OTRS AG ((OTRS)) Community Edition:6.0.x version 6.0.1 and later versions. OTRS AG OTRS: 7.0.x version 7.0.27 and prior versions; 8.0.x version 8.0.14 and prior versions." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-79", "description": "CWE-79 Cross-site Scripting (XSS)", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2021-07-26T04:25:43", "orgId": "2e1bf29f-dc29-4ed8-830c-7b9348b6f0e8", "shortName": "OTRS" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "https://otrs.com/release-notes/otrs-security-advisory-2021-15/" } ], "solutions": [ { "lang": "en", "value": "Update to OTRS 8.0.15 or OTRS 7.0.28." } ], "source": { "advisory": "OSA-2021-15", "defect": [ "2021061442000603" ], "discovery": "USER" }, "title": "XSS attack using special link in email", "x_generator": { "engine": "Vulnogram 0.0.9" }, "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "security@otrs.com", "DATE_PUBLIC": "2021-07-26T00:00:00.000Z", "ID": "CVE-2021-36092", "STATE": "PUBLIC", "TITLE": "XSS attack using special link in email" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "((OTRS)) Community Edition", "version": { "version_data": [ { "version_affected": "\u003e=", "version_name": "6.0.x", "version_value": "6.0.1" } ] } }, { "product_name": "OTRS", "version": { "version_data": [ { "version_affected": "\u003c=", "version_name": "7.0.x", "version_value": "7.0.27" }, { "version_affected": "\u003c=", "version_name": "8.0.x", "version_value": "8.0.14" } ] } } ] }, "vendor_name": "OTRS AG" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "It\u0027s possible to create an email which contains specially crafted link and it can be used to perform XSS attack. This issue affects: OTRS AG ((OTRS)) Community Edition:6.0.x version 6.0.1 and later versions. OTRS AG OTRS: 7.0.x version 7.0.27 and prior versions; 8.0.x version 8.0.14 and prior versions." } ] }, "generator": { "engine": "Vulnogram 0.0.9" }, "impact": { "cvss": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N", "version": "3.1" } }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "CWE-79 Cross-site Scripting (XSS)" } ] } ] }, "references": { "reference_data": [ { "name": "https://otrs.com/release-notes/otrs-security-advisory-2021-15/", "refsource": "CONFIRM", "url": "https://otrs.com/release-notes/otrs-security-advisory-2021-15/" } ] }, "solution": [ { "lang": "en", "value": "Update to OTRS 8.0.15 or OTRS 7.0.28." } ], "source": { "advisory": "OSA-2021-15", "defect": [ "2021061442000603" ], "discovery": "USER" } } } }, "cveMetadata": { "assignerOrgId": "2e1bf29f-dc29-4ed8-830c-7b9348b6f0e8", "assignerShortName": "OTRS", "cveId": "CVE-2021-36092", "datePublished": "2021-07-26T04:25:43.381697Z", "dateReserved": "2021-07-01T00:00:00", "dateUpdated": "2024-09-17T03:02:46.230Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2022-39049
Vulnerability from cvelistv5
Published
2022-09-05 06:40
Modified
2024-09-16 23:10
Severity ?
EPSS score ?
Summary
Possible XSS in Admin Interface
References
▼ | URL | Tags |
---|---|---|
https://otrs.com/release-notes/otrs-security-advisory-2022-10/ | x_refsource_CONFIRM |
Impacted products
Vendor | Product | Version | |||||
---|---|---|---|---|---|---|---|
▼ | OTRS AG | OTRS |
Version: 7.0.x < Version: 8.0.x < |
||||
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T11:10:32.514Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://otrs.com/release-notes/otrs-security-advisory-2022-10/" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "OTRS", "vendor": "OTRS AG", "versions": [ { "lessThanOrEqual": "7.0.36", "status": "affected", "version": "7.0.x", "versionType": "custom" }, { "lessThanOrEqual": "8.0.24", "status": "affected", "version": "8.0.x", "versionType": "custom" } ] }, { "product": "((OTRS)) Community Edition", "vendor": "OTRS AG", "versions": [ { "lessThan": "6.0.x*", "status": "affected", "version": "6.0.1", "versionType": "custom" } ] } ], "credits": [ { "lang": "en", "value": "Special thanks to Aleksey Solovev for reporting these vulnerability." } ], "datePublic": "2022-09-05T00:00:00", "descriptions": [ { "lang": "en", "value": "An attacker who is logged into OTRS as an admin user may manipulate the URL to cause execution of JavaScript in the context of OTRS." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 3.5, "baseSeverity": "LOW", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "HIGH", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:U/C:L/I:L/A:N", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-79", "description": "CWE-79 Cross-site Scripting (XSS)", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2022-09-05T06:40:10", "orgId": "2e1bf29f-dc29-4ed8-830c-7b9348b6f0e8", "shortName": "OTRS" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "https://otrs.com/release-notes/otrs-security-advisory-2022-10/" } ], "solutions": [ { "lang": "en", "value": "Update to OTRS 7.0.37 or OTRS 8.0.25." } ], "source": { "advisory": "OSA-2022-10", "defect": [ "2022062842001012" ], "discovery": "EXTERNAL" }, "title": "Possible XSS in Admin Interface", "x_generator": { "engine": "Vulnogram 0.0.9" }, "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "security@otrs.com", "DATE_PUBLIC": "2022-09-05T07:00:00.000Z", "ID": "CVE-2022-39049", "STATE": "PUBLIC", "TITLE": "Possible XSS in Admin Interface" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "OTRS", "version": { "version_data": [ { "version_affected": "\u003c=", "version_name": "7.0.x", "version_value": "7.0.36" }, { "version_affected": "\u003c=", "version_name": "8.0.x", "version_value": "8.0.24" } ] } }, { "product_name": "((OTRS)) Community Edition", "version": { "version_data": [ { "version_affected": "\u003e=", "version_name": "6.0.x", "version_value": "6.0.1" } ] } } ] }, "vendor_name": "OTRS AG" } ] } }, "credit": [ { "lang": "eng", "value": "Special thanks to Aleksey Solovev for reporting these vulnerability." } ], "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "An attacker who is logged into OTRS as an admin user may manipulate the URL to cause execution of JavaScript in the context of OTRS." } ] }, "generator": { "engine": "Vulnogram 0.0.9" }, "impact": { "cvss": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 3.5, "baseSeverity": "LOW", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "HIGH", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:U/C:L/I:L/A:N", "version": "3.1" } }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "CWE-79 Cross-site Scripting (XSS)" } ] } ] }, "references": { "reference_data": [ { "name": "https://otrs.com/release-notes/otrs-security-advisory-2022-10/", "refsource": "CONFIRM", "url": "https://otrs.com/release-notes/otrs-security-advisory-2022-10/" } ] }, "solution": [ { "lang": "en", "value": "Update to OTRS 7.0.37 or OTRS 8.0.25." } ], "source": { "advisory": "OSA-2022-10", "defect": [ "2022062842001012" ], "discovery": "EXTERNAL" } } } }, "cveMetadata": { "assignerOrgId": "2e1bf29f-dc29-4ed8-830c-7b9348b6f0e8", "assignerShortName": "OTRS", "cveId": "CVE-2022-39049", "datePublished": "2022-09-05T06:40:11.053227Z", "dateReserved": "2022-08-31T00:00:00", "dateUpdated": "2024-09-16T23:10:38.532Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }