All the vulnerabilites related to OTRS AG - OTRS
cve-2020-1765
Vulnerability from cvelistv5
Published
2020-01-10 15:08
Modified
2024-09-16 22:15
Severity ?
EPSS score ?
Summary
An improper control of parameters allows the spoofing of the from fields of the following screens: AgentTicketCompose, AgentTicketForward, AgentTicketBounce and AgentTicketEmailOutbound. This issue affects: ((OTRS)) Community Edition 5.0.x version 5.0.39 and prior versions; 6.0.x version 6.0.24 and prior versions. OTRS 7.0.x version 7.0.13 and prior versions.
References
Impacted products
Vendor | Product | Version | |||||
---|---|---|---|---|---|---|---|
▼ | OTRS AG | ((OTRS)) Community Edition |
Version: 5.0.x version 5.0.39 and prior versions Version: 6.0.x version 6.0.24 and prior versions |
||||
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T06:46:30.988Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://otrs.com/release-notes/otrs-security-advisory-2020-01/" }, { "name": "[debian-lts-announce] 20200129 [SECURITY] [DLA 2079-1] otrs2 security update", "tags": [ "mailing-list", "x_transferred" ], "url": "https://lists.debian.org/debian-lts-announce/2020/01/msg00027.html" }, { "name": "openSUSE-SU-2020:0551", "tags": [ "vendor-advisory", "x_transferred" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2020-04/msg00038.html" }, { "name": "openSUSE-SU-2020:1475", "tags": [ "vendor-advisory", "x_transferred" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00066.html" }, { "name": "openSUSE-SU-2020:1509", "tags": [ "vendor-advisory", "x_transferred" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00077.html" }, { "name": "[debian-lts-announce] 20230831 [SECURITY] [DLA 3551-1] otrs2 security update", "tags": [ "mailing-list", "x_transferred" ], "url": "https://lists.debian.org/debian-lts-announce/2023/08/msg00040.html" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "((OTRS)) Community Edition", "vendor": "OTRS AG", "versions": [ { "status": "affected", "version": "5.0.x version 5.0.39 and prior versions" }, { "status": "affected", "version": "6.0.x version 6.0.24 and prior versions" } ] }, { "product": "OTRS", "vendor": "OTRS AG", "versions": [ { "status": "affected", "version": "7.0.x version 7.0.13 and prior versions" } ] } ], "credits": [ { "lang": "en", "value": "Sebastian Renker, Jonas Becker" } ], "datePublic": "2020-01-10T00:00:00", "descriptions": [ { "lang": "en", "value": "An improper control of parameters allows the spoofing of the from fields of the following screens: AgentTicketCompose, AgentTicketForward, AgentTicketBounce and AgentTicketEmailOutbound. This issue affects: ((OTRS)) Community Edition 5.0.x version 5.0.39 and prior versions; 6.0.x version 6.0.24 and prior versions. OTRS 7.0.x version 7.0.13 and prior versions." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 3.5, "baseSeverity": "LOW", "confidentialityImpact": "NONE", "integrityImpact": "LOW", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:L/A:N", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-472", "description": "CWE-472 External Control of Assumed-Immutable Web Parameter", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2023-08-31T02:06:14.280325", "orgId": "2e1bf29f-dc29-4ed8-830c-7b9348b6f0e8", "shortName": "OTRS" }, "references": [ { "url": "https://otrs.com/release-notes/otrs-security-advisory-2020-01/" }, { "name": "[debian-lts-announce] 20200129 [SECURITY] [DLA 2079-1] otrs2 security update", "tags": [ "mailing-list" ], "url": "https://lists.debian.org/debian-lts-announce/2020/01/msg00027.html" }, { "name": "openSUSE-SU-2020:0551", "tags": [ "vendor-advisory" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2020-04/msg00038.html" }, { "name": "openSUSE-SU-2020:1475", "tags": [ "vendor-advisory" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00066.html" }, { "name": "openSUSE-SU-2020:1509", "tags": [ "vendor-advisory" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00077.html" }, { "name": "[debian-lts-announce] 20230831 [SECURITY] [DLA 3551-1] otrs2 security update", "tags": [ "mailing-list" ], "url": "https://lists.debian.org/debian-lts-announce/2023/08/msg00040.html" } ], "solutions": [ { "lang": "en", "value": "Upgrade to OTRS 7.0.14, ((OTRS)) Community Edition 6.0.25, ((OTRS)) Community Edition 5.0.40" }, { "lang": "en", "value": "Patch for ((OTRS)) Community Edition 6: https://github.com/OTRS/otrs/commit/d146d4997cbd6e1370669784c6a2ec8d64655252 \nPatch for ((OTRS)) Community Edition 5: https://github.com/OTRS/otrs/commit/874889b86abea4c01ceb1368a836b66694fae1c3" } ], "source": { "advisory": "OSA-2020-01", "defect": [ "2019100942003876" ], "discovery": "EXTERNAL" }, "title": "Spoofing of From field in several screens", "x_generator": { "engine": "Vulnogram 0.0.9" } } }, "cveMetadata": { "assignerOrgId": "2e1bf29f-dc29-4ed8-830c-7b9348b6f0e8", "assignerShortName": "OTRS", "cveId": "CVE-2020-1765", "datePublished": "2020-01-10T15:08:55.756034Z", "dateReserved": "2019-11-29T00:00:00", "dateUpdated": "2024-09-16T22:15:10.396Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2024-6540
Vulnerability from cvelistv5
Published
2024-07-15 07:13
Modified
2024-08-01 21:41
Severity ?
EPSS score ?
Summary
Improper filtering of fields when using the export function in the ticket overview of the external interface in OTRS could allow an authorized user to download a list of tickets containing information about tickets of other customers. The problem only occurs if the TicketSearchLegacyEngine has been disabled by the administrator.
This issue affects OTRS: 8.0.X, 2023.X, from 2024.X through 2024.4.x
References
Impacted products
{ "containers": { "adp": [ { "metrics": [ { "other": { "content": { "id": "CVE-2024-6540", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-07-15T13:10:12.804749Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-07-15T13:10:28.205Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" }, { "providerMetadata": { "dateUpdated": "2024-08-01T21:41:03.955Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://otrs.com/release-notes/otrs-security-advisory-2024-07/" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "modules": [ "External interface" ], "product": "OTRS", "vendor": "OTRS AG", "versions": [ { "status": "affected", "version": "8.0.x" }, { "status": "affected", "version": "2023.x" }, { "lessThanOrEqual": "2024.4.x", "status": "affected", "version": "2024.x", "versionType": "Patch" } ] } ], "datePublic": "2024-07-15T07:00:00.000Z", "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "Improper filtering of fields when using the export function in the ticket overview of the external interface in OTRS could allow an authorized user to download a list of tickets containing information about tickets of other customers. The problem only occurs if the TicketSearchLegacyEngine has been disabled by the administrator.\u003cbr\u003e\u003cp\u003eThis issue affects OTRS: 8.0.X, 2023.X, from 2024.X through 2024.4.x\u003c/p\u003e" } ], "value": "Improper filtering of fields when using the export function in the ticket overview of the external interface in OTRS could allow an authorized user to download a list of tickets containing information about tickets of other customers. The problem only occurs if the TicketSearchLegacyEngine has been disabled by the administrator.\nThis issue affects OTRS: 8.0.X, 2023.X, from 2024.X through 2024.4.x\n\n" } ], "impacts": [ { "capecId": "CAPEC-54", "descriptions": [ { "lang": "en", "value": "CAPEC-54 Query System for Information" } ] } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.7, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:N/A:N", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-790", "description": "CWE-790 Improper Filtering of Special Elements", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-07-15T10:41:47.335Z", "orgId": "2e1bf29f-dc29-4ed8-830c-7b9348b6f0e8", "shortName": "OTRS" }, "references": [ { "url": "https://otrs.com/release-notes/otrs-security-advisory-2024-07/" } ], "solutions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "Update to OTRS 2024.5.2\u003cbr\u003e" } ], "value": "Update to OTRS 2024.5.2\n" } ], "source": { "advisory": "OSA-2024-07", "defect": [ "Issue##2638", "Ticket#2024070142001245" ], "discovery": "USER" }, "title": "Information exlosure in external interface", "workarounds": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "Have TicketSearchLegacyEngine enabled\u003cbr\u003e" } ], "value": "Have TicketSearchLegacyEngine enabled\n" } ], "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "2e1bf29f-dc29-4ed8-830c-7b9348b6f0e8", "assignerShortName": "OTRS", "cveId": "CVE-2024-6540", "datePublished": "2024-07-15T07:13:49.918Z", "dateReserved": "2024-07-08T07:35:49.064Z", "dateUpdated": "2024-08-01T21:41:03.955Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2022-39049
Vulnerability from cvelistv5
Published
2022-09-05 06:40
Modified
2024-09-16 23:10
Severity ?
EPSS score ?
Summary
An attacker who is logged into OTRS as an admin user may manipulate the URL to cause execution of JavaScript in the context of OTRS.
References
▼ | URL | Tags |
---|---|---|
https://otrs.com/release-notes/otrs-security-advisory-2022-10/ | x_refsource_CONFIRM |
Impacted products
Vendor | Product | Version | |||||
---|---|---|---|---|---|---|---|
▼ | OTRS AG | OTRS |
Version: 7.0.x < Version: 8.0.x < |
||||
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T11:10:32.514Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://otrs.com/release-notes/otrs-security-advisory-2022-10/" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "OTRS", "vendor": "OTRS AG", "versions": [ { "lessThanOrEqual": "7.0.36", "status": "affected", "version": "7.0.x", "versionType": "custom" }, { "lessThanOrEqual": "8.0.24", "status": "affected", "version": "8.0.x", "versionType": "custom" } ] }, { "product": "((OTRS)) Community Edition", "vendor": "OTRS AG", "versions": [ { "lessThan": "6.0.x*", "status": "affected", "version": "6.0.1", "versionType": "custom" } ] } ], "credits": [ { "lang": "en", "value": "Special thanks to Aleksey Solovev for reporting these vulnerability." } ], "datePublic": "2022-09-05T00:00:00", "descriptions": [ { "lang": "en", "value": "An attacker who is logged into OTRS as an admin user may manipulate the URL to cause execution of JavaScript in the context of OTRS." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 3.5, "baseSeverity": "LOW", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "HIGH", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:U/C:L/I:L/A:N", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-79", "description": "CWE-79 Cross-site Scripting (XSS)", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2022-09-05T06:40:10", "orgId": "2e1bf29f-dc29-4ed8-830c-7b9348b6f0e8", "shortName": "OTRS" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "https://otrs.com/release-notes/otrs-security-advisory-2022-10/" } ], "solutions": [ { "lang": "en", "value": "Update to OTRS 7.0.37 or OTRS 8.0.25." } ], "source": { "advisory": "OSA-2022-10", "defect": [ "2022062842001012" ], "discovery": "EXTERNAL" }, "title": "Possible XSS in Admin Interface", "x_generator": { "engine": "Vulnogram 0.0.9" }, "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "security@otrs.com", "DATE_PUBLIC": "2022-09-05T07:00:00.000Z", "ID": "CVE-2022-39049", "STATE": "PUBLIC", "TITLE": "Possible XSS in Admin Interface" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "OTRS", "version": { "version_data": [ { "version_affected": "\u003c=", "version_name": "7.0.x", "version_value": "7.0.36" }, { "version_affected": "\u003c=", "version_name": "8.0.x", "version_value": "8.0.24" } ] } }, { "product_name": "((OTRS)) Community Edition", "version": { "version_data": [ { "version_affected": "\u003e=", "version_name": "6.0.x", "version_value": "6.0.1" } ] } } ] }, "vendor_name": "OTRS AG" } ] } }, "credit": [ { "lang": "eng", "value": "Special thanks to Aleksey Solovev for reporting these vulnerability." } ], "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "An attacker who is logged into OTRS as an admin user may manipulate the URL to cause execution of JavaScript in the context of OTRS." } ] }, "generator": { "engine": "Vulnogram 0.0.9" }, "impact": { "cvss": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 3.5, "baseSeverity": "LOW", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "HIGH", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:U/C:L/I:L/A:N", "version": "3.1" } }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "CWE-79 Cross-site Scripting (XSS)" } ] } ] }, "references": { "reference_data": [ { "name": "https://otrs.com/release-notes/otrs-security-advisory-2022-10/", "refsource": "CONFIRM", "url": "https://otrs.com/release-notes/otrs-security-advisory-2022-10/" } ] }, "solution": [ { "lang": "en", "value": "Update to OTRS 7.0.37 or OTRS 8.0.25." } ], "source": { "advisory": "OSA-2022-10", "defect": [ "2022062842001012" ], "discovery": "EXTERNAL" } } } }, "cveMetadata": { "assignerOrgId": "2e1bf29f-dc29-4ed8-830c-7b9348b6f0e8", "assignerShortName": "OTRS", "cveId": "CVE-2022-39049", "datePublished": "2022-09-05T06:40:11.053227Z", "dateReserved": "2022-08-31T00:00:00", "dateUpdated": "2024-09-16T23:10:38.532Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2021-36100
Vulnerability from cvelistv5
Published
2022-03-21 09:15
Modified
2024-09-17 02:00
Severity ?
EPSS score ?
Summary
Specially crafted string in OTRS system configuration can allow the execution of any system command.
References
Impacted products
Vendor | Product | Version | |||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
▼ | OTRS AG | OTRS |
Version: 8.0.x < Version: 7.0.x < |
||||||||||||
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T00:47:43.893Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://otrs.com/release-notes/otrs-security-advisory-2022-03/" }, { "name": "[debian-lts-announce] 20230831 [SECURITY] [DLA 3551-1] otrs2 security update", "tags": [ "mailing-list", "x_transferred" ], "url": "https://lists.debian.org/debian-lts-announce/2023/08/msg00040.html" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "OTRS", "vendor": "OTRS AG", "versions": [ { "lessThanOrEqual": "8.0.19", "status": "affected", "version": "8.0.x", "versionType": "custom" }, { "lessThanOrEqual": "7.0.32", "status": "affected", "version": "7.0.x", "versionType": "custom" } ] }, { "product": "SystemMonitoring", "vendor": "OTRS AG", "versions": [ { "lessThanOrEqual": "7.0.18", "status": "affected", "version": "7.0.x", "versionType": "custom" }, { "lessThanOrEqual": "8.0.8", "status": "affected", "version": "8.0.x", "versionType": "custom" }, { "lessThan": "6.0.x*", "status": "affected", "version": "6.0.1", "versionType": "custom" } ] }, { "product": "OTRSSTORM", "vendor": "OTRS AG", "versions": [ { "lessThanOrEqual": "7.0.27", "status": "affected", "version": "7.0.x", "versionType": "custom" }, { "lessThanOrEqual": "8.0.11", "status": "affected", "version": "8.0.x", "versionType": "custom" }, { "lessThan": "6.0.x*", "status": "affected", "version": "6.0.1", "versionType": "custom" } ] }, { "product": "((OTRS)) Community Edition", "vendor": "OTRS AG", "versions": [ { "lessThan": "6.0.x*", "status": "affected", "version": "6.0.1", "versionType": "custom" } ] } ], "credits": [ { "lang": "en", "value": "Special thanks to Rayhan Ahmed and Maxime Brigaudeau for reporting these vulnerability." } ], "datePublic": "2022-03-21T00:00:00", "descriptions": [ { "lang": "en", "value": "Specially crafted string in OTRS system configuration can allow the execution of any system command." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 6.4, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "HIGH", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:H/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "description": "rce", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2023-08-31T02:07:07.668759", "orgId": "2e1bf29f-dc29-4ed8-830c-7b9348b6f0e8", "shortName": "OTRS" }, "references": [ { "url": "https://otrs.com/release-notes/otrs-security-advisory-2022-03/" }, { "name": "[debian-lts-announce] 20230831 [SECURITY] [DLA 3551-1] otrs2 security update", "tags": [ "mailing-list" ], "url": "https://lists.debian.org/debian-lts-announce/2023/08/msg00040.html" } ], "solutions": [ { "lang": "en", "value": "Update to OTRS 8.0.20, OTRS 7.0.33. Update to OTRSSTORM 8.0.12, OTRS 7.0.28. Update to SystemMonitoring 8.0.9, OTRS 7.0.19." } ], "source": { "advisory": "OSA-2022-03", "defect": [ "2020093042003988", "2020090442000735", "2021102242000358" ], "discovery": "USER" }, "title": "Authenticated remote code execution", "x_generator": { "engine": "Vulnogram 0.0.9" } } }, "cveMetadata": { "assignerOrgId": "2e1bf29f-dc29-4ed8-830c-7b9348b6f0e8", "assignerShortName": "OTRS", "cveId": "CVE-2021-36100", "datePublished": "2022-03-21T09:15:24.697180Z", "dateReserved": "2021-07-01T00:00:00", "dateUpdated": "2024-09-17T02:00:46.987Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2021-21439
Vulnerability from cvelistv5
Published
2021-06-14 07:55
Modified
2024-09-16 19:52
Severity ?
EPSS score ?
Summary
DoS attack can be performed when an email contains specially designed URL in the body. It can lead to the high CPU usage and cause low quality of service, or in extreme case bring the system to a halt. This issue affects: OTRS AG ((OTRS)) Community Edition 6.0.x version 6.0.1 and later versions. OTRS AG OTRS 7.0.x version 7.0.26 and prior versions; 8.0.x version 8.0.13 and prior versions.
References
Impacted products
Vendor | Product | Version | |||||
---|---|---|---|---|---|---|---|
▼ | OTRS AG | ((OTRS)) Community Edition |
Version: 6.0.1 < 6.0.x* |
||||
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T18:16:22.212Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://otrs.com/release-notes/otrs-security-advisory-2021-09/" }, { "name": "[debian-lts-announce] 20230831 [SECURITY] [DLA 3551-1] otrs2 security update", "tags": [ "mailing-list", "x_transferred" ], "url": "https://lists.debian.org/debian-lts-announce/2023/08/msg00040.html" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "((OTRS)) Community Edition", "vendor": "OTRS AG", "versions": [ { "lessThan": "6.0.x*", "status": "affected", "version": "6.0.1", "versionType": "custom" } ] }, { "product": "OTRS", "vendor": "OTRS AG", "versions": [ { "lessThanOrEqual": "7.0.26", "status": "affected", "version": "7.0.x", "versionType": "custom" }, { "lessThanOrEqual": "8.0.13", "status": "affected", "version": "8.0.x", "versionType": "custom" } ] } ], "datePublic": "2021-06-14T00:00:00", "descriptions": [ { "lang": "en", "value": "DoS attack can be performed when an email contains specially designed URL in the body. It can lead to the high CPU usage and cause low quality of service, or in extreme case bring the system to a halt. This issue affects: OTRS AG ((OTRS)) Community Edition 6.0.x version 6.0.1 and later versions. OTRS AG OTRS 7.0.x version 7.0.26 and prior versions; 8.0.x version 8.0.13 and prior versions." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-754", "description": "CWE-754: Improper Check for Unusual or Exceptional Conditions", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2023-08-31T02:06:20.978358", "orgId": "2e1bf29f-dc29-4ed8-830c-7b9348b6f0e8", "shortName": "OTRS" }, "references": [ { "url": "https://otrs.com/release-notes/otrs-security-advisory-2021-09/" }, { "name": "[debian-lts-announce] 20230831 [SECURITY] [DLA 3551-1] otrs2 security update", "tags": [ "mailing-list" ], "url": "https://lists.debian.org/debian-lts-announce/2023/08/msg00040.html" } ], "solutions": [ { "lang": "en", "value": "Update to OTRS 8.0.14 or OTRS 7.0.27." } ], "source": { "advisory": "OSA-2021-09", "defect": [ "2021031142000285" ], "discovery": "USER" }, "title": "Possible DoS attack using a special crafted URL in email body", "x_generator": { "engine": "Vulnogram 0.0.9" } } }, "cveMetadata": { "assignerOrgId": "2e1bf29f-dc29-4ed8-830c-7b9348b6f0e8", "assignerShortName": "OTRS", "cveId": "CVE-2021-21439", "datePublished": "2021-06-14T07:55:10.080008Z", "dateReserved": "2020-12-29T00:00:00", "dateUpdated": "2024-09-16T19:52:22.948Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2023-1248
Vulnerability from cvelistv5
Published
2023-03-20 08:19
Modified
2024-08-02 05:40
Severity ?
EPSS score ?
Summary
Improper Input Validation vulnerability in OTRS AG OTRS (Ticket Actions modules), OTRS AG ((OTRS)) Community Edition (Ticket Actions modules) allows Cross-Site Scripting (XSS).This issue affects OTRS: from 7.0.X before 7.0.42; ((OTRS)) Community Edition: from 6.0.1 through 6.0.34.
References
Impacted products
Vendor | Product | Version | |||||
---|---|---|---|---|---|---|---|
▼ | OTRS AG | OTRS |
Version: 7.0.x |
||||
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T05:40:59.638Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://otrs.com/release-notes/otrs-security-advisory-2023-01/" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "defaultStatus": "affected", "modules": [ "Ticket Actions" ], "product": "OTRS", "vendor": "OTRS AG", "versions": [ { "lessThan": "7.0.42", "status": "affected", "version": "7.0.x", "versionType": "Patch" } ] }, { "defaultStatus": "affected", "modules": [ "Ticket Actions" ], "product": "((OTRS)) Community Edition", "vendor": "OTRS AG", "versions": [ { "lessThanOrEqual": "6.0.34", "status": "affected", "version": "6.0.1", "versionType": "All" } ] } ], "datePublic": "2023-03-20T07:00:00.000Z", "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "Improper Input Validation vulnerability in OTRS AG OTRS (Ticket Actions modules), OTRS AG ((OTRS)) Community Edition (Ticket Actions modules) allows Cross-Site Scripting (XSS).\u003cp\u003eThis issue affects OTRS: from 7.0.X before 7.0.42; ((OTRS)) Community Edition: from 6.0.1 through 6.0.34.\u003c/p\u003e" } ], "value": "Improper Input Validation vulnerability in OTRS AG OTRS (Ticket Actions modules), OTRS AG ((OTRS)) Community Edition (Ticket Actions modules) allows Cross-Site Scripting (XSS).This issue affects OTRS: from 7.0.X before 7.0.42; ((OTRS)) Community Edition: from 6.0.1 through 6.0.34.\n\n" } ], "impacts": [ { "capecId": "CAPEC-63", "descriptions": [ { "lang": "en", "value": "CAPEC-63 Cross-Site Scripting (XSS)" } ] } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.1, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-79", "description": "CWE-79 Improper Neutralization of Input During Web Page Generation (\u0027Cross-site Scripting\u0027)", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2023-03-20T08:20:17.212Z", "orgId": "2e1bf29f-dc29-4ed8-830c-7b9348b6f0e8", "shortName": "OTRS" }, "references": [ { "url": "https://otrs.com/release-notes/otrs-security-advisory-2023-01/" } ], "solutions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "\nUpdate to OTRS 7.0.42\u003cbr\u003e" } ], "value": "Update to OTRS 7.0.42\n" } ], "source": { "advisory": "OSA-2023-01", "defect": [ "364" ], "discovery": "USER" }, "title": " Possible XSS in Ticket Actions", "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "2e1bf29f-dc29-4ed8-830c-7b9348b6f0e8", "assignerShortName": "OTRS", "cveId": "CVE-2023-1248", "datePublished": "2023-03-20T08:19:34.182Z", "dateReserved": "2023-03-07T09:06:22.435Z", "dateUpdated": "2024-08-02T05:40:59.638Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2023-38057
Vulnerability from cvelistv5
Published
2023-07-24 08:27
Modified
2024-10-17 13:02
Severity ?
EPSS score ?
Summary
An improper input validation vulnerability in OTRS Survey modules allows any attacker with a link to a valid and unanswered survey request to inject javascript code in free text answers. This allows a cross site scripting attack while reading the replies as authenticated agent.
This issue affects OTRS Survey module from 7.0.X before 7.0.32, from 8.0.X before 8.0.13 and ((OTRS)) Community Edition Survey module from 6.0.X through 6.0.22.
References
Impacted products
Vendor | Product | Version | |||||
---|---|---|---|---|---|---|---|
▼ | OTRS AG | OTRS |
Version: 7.0.x Version: 8.0.x |
||||
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T17:30:12.921Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://otrs.com/release-notes/otrs-security-advisory-2023-06/" } ], "title": "CVE Program Container" }, { "metrics": [ { "other": { "content": { "id": "CVE-2023-38057", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-10-17T13:01:44.457515Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-10-17T13:02:55.563Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "affected", "packageName": "Survey", "product": "OTRS", "vendor": "OTRS AG", "versions": [ { "lessThan": "7.0.32", "status": "affected", "version": "7.0.x", "versionType": "Patch" }, { "lessThan": "8.0.13", "status": "affected", "version": "8.0.x", "versionType": "Patch" } ] }, { "defaultStatus": "affected", "packageName": "Survey", "product": "((OTRS)) Community Edition", "vendor": "OTRS AG", "versions": [ { "lessThanOrEqual": "6.0.22", "status": "affected", "version": "6.0.x", "versionType": "All" } ] } ], "configurations": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "Free text answers have to be used\u003cbr\u003e" } ], "value": "Free text answers have to be used\n" } ], "credits": [ { "lang": "en", "type": "finder", "user": "00000000-0000-4000-9000-000000000000", "value": "Special thanks to Daniel Mizael, Raphael Fiorin and Marcelo Makotofrom for reporting these vulnerability." } ], "datePublic": "2023-07-24T07:00:00.000Z", "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "An improper input validation vulnerability in OTRS Survey modules allows any attacker with a link to a valid and unanswered survey request to inject javascript code in free text answers. This allows a cross site scripting attack while reading the replies as authenticated agent.\u003cbr\u003e\u003cp\u003eThis issue affects OTRS Survey module from 7.0.X before 7.0.32, from 8.0.X before 8.0.13 and ((OTRS)) Community Edition Survey module from 6.0.X through 6.0.22.\u003c/p\u003e" } ], "value": "An improper input validation vulnerability in OTRS Survey modules allows any attacker with a link to a valid and unanswered survey request to inject javascript code in free text answers. This allows a cross site scripting attack while reading the replies as authenticated agent.\nThis issue affects OTRS Survey module from 7.0.X before 7.0.32, from 8.0.X before 8.0.13 and ((OTRS)) Community Edition Survey module from 6.0.X through 6.0.22.\n\n" } ], "impacts": [ { "capecId": "CAPEC-63", "descriptions": [ { "lang": "en", "value": "CAPEC-63 Cross-Site Scripting (XSS)" } ] } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 4.1, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "LOW", "privilegesRequired": "LOW", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:N/I:L/A:N", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-20", "description": "CWE-20 Improper Input Validation", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2023-07-24T08:27:55.315Z", "orgId": "2e1bf29f-dc29-4ed8-830c-7b9348b6f0e8", "shortName": "OTRS" }, "references": [ { "url": "https://otrs.com/release-notes/otrs-security-advisory-2023-06/" } ], "solutions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "\nUpdate Survey package to version 8.0.13 or 7.0.32\n\u003cbr\u003e" } ], "value": "Update Survey package to version 8.0.13 or 7.0.32\n\n" } ], "source": { "advisory": "OSA-2023-06", "defect": [ "Issue#769", "Ticket#2023020942001367" ], "discovery": "EXTERNAL" }, "title": "XSS stored in survey answers", "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "2e1bf29f-dc29-4ed8-830c-7b9348b6f0e8", "assignerShortName": "OTRS", "cveId": "CVE-2023-38057", "datePublished": "2023-07-24T08:27:55.315Z", "dateReserved": "2023-07-12T08:05:38.780Z", "dateUpdated": "2024-10-17T13:02:55.563Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2024-23790
Vulnerability from cvelistv5
Published
2024-01-29 09:21
Modified
2024-08-01 23:13
Severity ?
EPSS score ?
Summary
Improper Input Validation vulnerability in the upload functionality for user avatars allows functionality misuse due to missing check of filetypes.
This issue affects OTRS: from 7.0.X through 7.0.48, from 8.0.X through 8.0.37, from 2023 through 2023.1.1.
References
▼ | URL | Tags |
---|---|---|
https://otrs.com/release-notes/otrs-security-advisory-2024-01/ | vendor-advisory |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-01T23:13:07.512Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "vendor-advisory", "x_transferred" ], "url": "https://otrs.com/release-notes/otrs-security-advisory-2024-01/" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "defaultStatus": "unknown", "modules": [ "Agent Interface", "External Interface" ], "product": "OTRS", "vendor": "OTRS AG", "versions": [ { "lessThanOrEqual": "8.0.37", "status": "affected", "version": "8.0.x", "versionType": "Patch" }, { "lessThanOrEqual": "2023.1.1", "status": "affected", "version": "2023", "versionType": "Patch" }, { "lessThanOrEqual": "7.0.48", "status": "affected", "version": "7.0.x", "versionType": "Patch" } ] } ], "credits": [ { "lang": "en", "type": "reporter", "value": "Special thanks to Matthias P\u00fcschel for reporting these vulnerability." } ], "datePublic": "2024-01-29T08:00:00.000Z", "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "Improper Input Validation vulnerability in the upload functionality for user avatars allows functionality misuse due to missing check of filetypes.\u003cbr\u003e\u003cp\u003eThis issue affects OTRS: from 7.0.X through 7.0.48, from 8.0.X through 8.0.37, from 2023 through 2023.1.1.\u003c/p\u003e" } ], "value": "Improper Input Validation vulnerability in the upload functionality for user avatars allows functionality misuse due to missing check of filetypes.\nThis issue affects OTRS: from 7.0.X through 7.0.48, from 8.0.X through 8.0.37, from 2023 through 2023.1.1.\n\n" } ], "impacts": [ { "capecId": "CAPEC-212", "descriptions": [ { "lang": "en", "value": "CAPEC-212 Functionality Misuse" } ] } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 3.5, "baseSeverity": "LOW", "confidentialityImpact": "LOW", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:L/I:N/A:N", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-20", "description": "CWE-20 Improper Input Validation", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-01-29T09:21:14.996Z", "orgId": "2e1bf29f-dc29-4ed8-830c-7b9348b6f0e8", "shortName": "OTRS" }, "references": [ { "tags": [ "vendor-advisory" ], "url": "https://otrs.com/release-notes/otrs-security-advisory-2024-01/" } ], "solutions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "\u003cdiv\u003eUpdate to OTRS Patch 2024.1.1\u003c/div\u003e\u003cdiv\u003eUpdate to OTRS 7.0.49 (Long Term Support Users)\u003cbr\u003e\u003c/div\u003e\u003cdiv\u003e\u003cbr\u003e\u003c/div\u003e\u003cbr\u003e" } ], "value": "Update to OTRS Patch 2024.1.1\n\nUpdate to OTRS 7.0.49 (Long Term Support Users)\n\n" } ], "source": { "advisory": "OSA-2024-01", "defect": [ "Ticket#2023083042000825", "Issue#1306" ], "discovery": "EXTERNAL" }, "title": "Missing file type check in avatar picture upload", "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "2e1bf29f-dc29-4ed8-830c-7b9348b6f0e8", "assignerShortName": "OTRS", "cveId": "CVE-2024-23790", "datePublished": "2024-01-29T09:21:14.996Z", "dateReserved": "2024-01-22T10:32:00.704Z", "dateUpdated": "2024-08-01T23:13:07.512Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2021-36094
Vulnerability from cvelistv5
Published
2021-09-06 13:15
Modified
2024-09-16 19:09
Severity ?
EPSS score ?
Summary
It's possible to craft a request for appointment edit screen, which could lead to the XSS attack. This issue affects: OTRS AG ((OTRS)) Community Edition 6.0.x version 6.0.1 and later versions. OTRS AG OTRS 7.0.x version 7.0.28 and prior versions.
References
▼ | URL | Tags |
---|---|---|
https://otrs.com/release-notes/otrs-security-advisory-2021-17/ | x_refsource_CONFIRM |
Impacted products
Vendor | Product | Version | |||||
---|---|---|---|---|---|---|---|
▼ | OTRS AG | ((OTRS)) Community Edition |
Version: 6.0.1 < 6.0.x* |
||||
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T00:47:43.810Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://otrs.com/release-notes/otrs-security-advisory-2021-17/" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "((OTRS)) Community Edition", "vendor": "OTRS AG", "versions": [ { "lessThan": "6.0.x*", "status": "affected", "version": "6.0.1", "versionType": "custom" } ] }, { "product": "OTRS", "vendor": "OTRS AG", "versions": [ { "lessThanOrEqual": "7.0.28", "status": "affected", "version": "7.0.x", "versionType": "custom" } ] } ], "datePublic": "2021-09-06T00:00:00", "descriptions": [ { "lang": "en", "value": "It\u0027s possible to craft a request for appointment edit screen, which could lead to the XSS attack. This issue affects: OTRS AG ((OTRS)) Community Edition 6.0.x version 6.0.1 and later versions. OTRS AG OTRS 7.0.x version 7.0.28 and prior versions." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.7, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:H/A:N", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-79", "description": "CWE-79 Cross-site Scripting (XSS)", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2021-09-06T13:15:25", "orgId": "2e1bf29f-dc29-4ed8-830c-7b9348b6f0e8", "shortName": "OTRS" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "https://otrs.com/release-notes/otrs-security-advisory-2021-17/" } ], "solutions": [ { "lang": "en", "value": "Update to OTRS 7.0.29." } ], "source": { "advisory": "OSA-2021-17", "defect": [ "2021062442001352" ], "discovery": "USER" }, "title": "XSS attack in appointment edit popup screen", "x_generator": { "engine": "Vulnogram 0.0.9" }, "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "security@otrs.com", "DATE_PUBLIC": "2021-09-06T00:00:00.000Z", "ID": "CVE-2021-36094", "STATE": "PUBLIC", "TITLE": "XSS attack in appointment edit popup screen" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "((OTRS)) Community Edition", "version": { "version_data": [ { "version_affected": "\u003e=", "version_name": "6.0.x", "version_value": "6.0.1" } ] } }, { "product_name": "OTRS", "version": { "version_data": [ { "version_affected": "\u003c=", "version_name": "7.0.x", "version_value": "7.0.28" } ] } } ] }, "vendor_name": "OTRS AG" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "It\u0027s possible to craft a request for appointment edit screen, which could lead to the XSS attack. This issue affects: OTRS AG ((OTRS)) Community Edition 6.0.x version 6.0.1 and later versions. OTRS AG OTRS 7.0.x version 7.0.28 and prior versions." } ] }, "generator": { "engine": "Vulnogram 0.0.9" }, "impact": { "cvss": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.7, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:H/A:N", "version": "3.1" } }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "CWE-79 Cross-site Scripting (XSS)" } ] } ] }, "references": { "reference_data": [ { "name": "https://otrs.com/release-notes/otrs-security-advisory-2021-17/", "refsource": "CONFIRM", "url": "https://otrs.com/release-notes/otrs-security-advisory-2021-17/" } ] }, "solution": [ { "lang": "en", "value": "Update to OTRS 7.0.29." } ], "source": { "advisory": "OSA-2021-17", "defect": [ "2021062442001352" ], "discovery": "USER" } } } }, "cveMetadata": { "assignerOrgId": "2e1bf29f-dc29-4ed8-830c-7b9348b6f0e8", "assignerShortName": "OTRS", "cveId": "CVE-2021-36094", "datePublished": "2021-09-06T13:15:25.712091Z", "dateReserved": "2021-07-01T00:00:00", "dateUpdated": "2024-09-16T19:09:09.574Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2021-36091
Vulnerability from cvelistv5
Published
2021-07-26 04:25
Modified
2024-09-16 17:59
Severity ?
EPSS score ?
Summary
Agents are able to list appointments in the calendars without required permissions. This issue affects: OTRS AG ((OTRS)) Community Edition: 6.0.x version 6.0.1 and later versions. OTRS AG OTRS: 7.0.x versions prior to 7.0.27.
References
Impacted products
Vendor | Product | Version | |||||
---|---|---|---|---|---|---|---|
▼ | OTRS AG | ((OTRS)) Community Edition |
Version: 6.0.1 < 6.0.x* |
||||
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T00:47:43.812Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://otrs.com/release-notes/otrs-security-advisory-2021-14/" }, { "name": "[debian-lts-announce] 20230831 [SECURITY] [DLA 3551-1] otrs2 security update", "tags": [ "mailing-list", "x_transferred" ], "url": "https://lists.debian.org/debian-lts-announce/2023/08/msg00040.html" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "((OTRS)) Community Edition", "vendor": "OTRS AG", "versions": [ { "lessThan": "6.0.x*", "status": "affected", "version": "6.0.1", "versionType": "custom" } ] }, { "product": "OTRS", "vendor": "OTRS AG", "versions": [ { "lessThan": "7.0.27", "status": "affected", "version": "7.0.x", "versionType": "custom" } ] } ], "datePublic": "2021-07-26T00:00:00", "descriptions": [ { "lang": "en", "value": "Agents are able to list appointments in the calendars without required permissions. This issue affects: OTRS AG ((OTRS)) Community Edition: 6.0.x version 6.0.1 and later versions. OTRS AG OTRS: 7.0.x versions prior to 7.0.27." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 3.5, "baseSeverity": "LOW", "confidentialityImpact": "LOW", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:L/I:N/A:N", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-200", "description": "CWE-200 Information Exposure", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2023-08-31T02:06:38.799737", "orgId": "2e1bf29f-dc29-4ed8-830c-7b9348b6f0e8", "shortName": "OTRS" }, "references": [ { "url": "https://otrs.com/release-notes/otrs-security-advisory-2021-14/" }, { "name": "[debian-lts-announce] 20230831 [SECURITY] [DLA 3551-1] otrs2 security update", "tags": [ "mailing-list" ], "url": "https://lists.debian.org/debian-lts-announce/2023/08/msg00040.html" } ], "solutions": [ { "lang": "en", "value": "Update to OTRS 7.0.28." } ], "source": { "advisory": "OSA-2021-14", "defect": [ "2021062442001398" ], "discovery": "USER" }, "title": "Unautorized access to the calendar appointments", "x_generator": { "engine": "Vulnogram 0.0.9" } } }, "cveMetadata": { "assignerOrgId": "2e1bf29f-dc29-4ed8-830c-7b9348b6f0e8", "assignerShortName": "OTRS", "cveId": "CVE-2021-36091", "datePublished": "2021-07-26T04:25:41.820529Z", "dateReserved": "2021-07-01T00:00:00", "dateUpdated": "2024-09-16T17:59:18.697Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2024-23791
Vulnerability from cvelistv5
Published
2024-01-29 09:21
Modified
2024-08-01 23:13
Severity ?
EPSS score ?
Summary
Insertion of debug information into log file during building the elastic search index allows reading of sensitive information from articles.This issue affects OTRS: from 7.0.X through 7.0.48, from 8.0.X through 8.0.37, from 2023.X through 2023.1.1.
References
▼ | URL | Tags |
---|---|---|
https://otrs.com/release-notes/otrs-security-advisory-2024-02/ | vendor-advisory |
Impacted products
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-01T23:13:07.364Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "vendor-advisory", "x_transferred" ], "url": "https://otrs.com/release-notes/otrs-security-advisory-2024-02/" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "defaultStatus": "unknown", "modules": [ "Log Backend" ], "product": "OTRS", "vendor": "OTRS AG", "versions": [ { "lessThanOrEqual": "7.0.48", "status": "affected", "version": "7.0.x", "versionType": "Patch" }, { "lessThanOrEqual": "8.0.37", "status": "affected", "version": "8.0.x", "versionType": "Patch" }, { "lessThanOrEqual": "2023.1.1", "status": "affected", "version": "2023.x", "versionType": "Patch" } ] } ], "datePublic": "2024-01-29T08:00:00.000Z", "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "Insertion of debug information into log file during building the elastic search index allows reading of sensitive information from articles.\u003cp\u003eThis issue affects OTRS: from 7.0.X through 7.0.48, from 8.0.X through 8.0.37, from 2023.X through 2023.1.1.\u003c/p\u003e" } ], "value": "Insertion of debug information into log file during building the elastic search index allows reading of sensitive information from articles.This issue affects OTRS: from 7.0.X through 7.0.48, from 8.0.X through 8.0.37, from 2023.X through 2023.1.1.\n\n" } ], "impacts": [ { "capecId": "CAPEC-545", "descriptions": [ { "lang": "en", "value": "CAPEC-545 Pull Data from System Resources" } ] } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 4.9, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "HIGH", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-532", "description": "CWE-532 Insertion of Sensitive Information into Log File", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-01-29T09:21:00.278Z", "orgId": "2e1bf29f-dc29-4ed8-830c-7b9348b6f0e8", "shortName": "OTRS" }, "references": [ { "tags": [ "vendor-advisory" ], "url": "https://otrs.com/release-notes/otrs-security-advisory-2024-02/" } ], "solutions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "\u003cdiv\u003eUpdate to OTRS Patch 2024.1.1\u003c/div\u003e\u003cdiv\u003eUpdate to OTRS 7.0.49 (Long Term Support Users)\u003c/div\u003e\u003cbr\u003e" } ], "value": "Update to OTRS Patch 2024.1.1\n\nUpdate to OTRS 7.0.49 (Long Term Support Users)\n\n" } ], "source": { "advisory": "OSA-2024-02", "defect": [ "Issue#1224", "Ticket#2021091742001128" ], "discovery": "USER" }, "title": "Unnecessary data is written to log if issues during indexing occurs", "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "2e1bf29f-dc29-4ed8-830c-7b9348b6f0e8", "assignerShortName": "OTRS", "cveId": "CVE-2024-23791", "datePublished": "2024-01-29T09:21:00.278Z", "dateReserved": "2024-01-22T10:32:00.704Z", "dateUpdated": "2024-08-01T23:13:07.364Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2022-32739
Vulnerability from cvelistv5
Published
2022-06-13 08:00
Modified
2024-09-17 02:47
Severity ?
EPSS score ?
Summary
When Secure::DisableBanner system configuration has been disabled and agent shares his calendar via public URL, received ICS file contains OTRS release number.
References
▼ | URL | Tags |
---|---|---|
https://otrs.com/release-notes/otrs-security-advisory-2022-07/ | x_refsource_CONFIRM |
Impacted products
Vendor | Product | Version | |||||
---|---|---|---|---|---|---|---|
▼ | OTRS AG | OTRS |
Version: 7.0.x < Version: 8.0.x < |
||||
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T07:46:45.242Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://otrs.com/release-notes/otrs-security-advisory-2022-07/" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "OTRS", "vendor": "OTRS AG", "versions": [ { "lessThanOrEqual": "7.0.34", "status": "affected", "version": "7.0.x", "versionType": "custom" }, { "lessThanOrEqual": "8.0.22", "status": "affected", "version": "8.0.x", "versionType": "custom" } ] }, { "product": "OTRSCalendarResourcePlanning", "vendor": "OTRS AG", "versions": [ { "lessThanOrEqual": "7.0.30", "status": "affected", "version": "7.0.x", "versionType": "custom" }, { "lessThanOrEqual": "8.0.20", "status": "affected", "version": "8.0.x", "versionType": "custom" } ] } ], "credits": [ { "lang": "en", "value": "Special thanks to L\u00e1szl\u00f3 Gyaraki for reporting these vulnerability." } ], "datePublic": "2022-06-13T00:00:00", "descriptions": [ { "lang": "en", "value": "When Secure::DisableBanner system configuration has been disabled and agent shares his calendar via public URL, received ICS file contains OTRS release number." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 3.5, "baseSeverity": "LOW", "confidentialityImpact": "LOW", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:L/I:N/A:N", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-200", "description": "CWE-200 Information Exposure", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2022-06-13T08:00:33", "orgId": "2e1bf29f-dc29-4ed8-830c-7b9348b6f0e8", "shortName": "OTRS" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "https://otrs.com/release-notes/otrs-security-advisory-2022-07/" } ], "solutions": [ { "lang": "en", "value": "Update to OTRS 8.0.23 or OTRS 7.0.35.\nUpdate to OTRSCalendarResourcePlanning 8.0.23 or OTRSCalendarResourcePlanning 7.0.31." } ], "source": { "advisory": "OSA-2022-07", "defect": [ "2022031642001899" ], "discovery": "INTERNAL" }, "title": "OTRS version number is always in the exported ICS files", "x_generator": { "engine": "Vulnogram 0.0.9" }, "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "security@otrs.com", "DATE_PUBLIC": "2022-06-13T07:00:00.000Z", "ID": "CVE-2022-32739", "STATE": "PUBLIC", "TITLE": "OTRS version number is always in the exported ICS files" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "OTRS", "version": { "version_data": [ { "version_affected": "\u003c=", "version_name": "7.0.x", "version_value": "7.0.34" }, { "version_affected": "\u003c=", "version_name": "8.0.x", "version_value": "8.0.22" } ] } }, { "product_name": "OTRSCalendarResourcePlanning", "version": { "version_data": [ { "version_affected": "\u003c=", "version_name": "7.0.x", "version_value": "7.0.30" }, { "version_affected": "\u003c=", "version_name": "8.0.x", "version_value": "8.0.20" } ] } } ] }, "vendor_name": "OTRS AG" } ] } }, "credit": [ { "lang": "eng", "value": "Special thanks to L\u00e1szl\u00f3 Gyaraki for reporting these vulnerability." } ], "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "When Secure::DisableBanner system configuration has been disabled and agent shares his calendar via public URL, received ICS file contains OTRS release number." } ] }, "generator": { "engine": "Vulnogram 0.0.9" }, "impact": { "cvss": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 3.5, "baseSeverity": "LOW", "confidentialityImpact": "LOW", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:L/I:N/A:N", "version": "3.1" } }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "CWE-200 Information Exposure" } ] } ] }, "references": { "reference_data": [ { "name": "https://otrs.com/release-notes/otrs-security-advisory-2022-07/", "refsource": "CONFIRM", "url": "https://otrs.com/release-notes/otrs-security-advisory-2022-07/" } ] }, "solution": [ { "lang": "en", "value": "Update to OTRS 8.0.23 or OTRS 7.0.35.\nUpdate to OTRSCalendarResourcePlanning 8.0.23 or OTRSCalendarResourcePlanning 7.0.31." } ], "source": { "advisory": "OSA-2022-07", "defect": [ "2022031642001899" ], "discovery": "INTERNAL" } } } }, "cveMetadata": { "assignerOrgId": "2e1bf29f-dc29-4ed8-830c-7b9348b6f0e8", "assignerShortName": "OTRS", "cveId": "CVE-2022-32739", "datePublished": "2022-06-13T08:00:33.252564Z", "dateReserved": "2022-06-09T00:00:00", "dateUpdated": "2024-09-17T02:47:17.842Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2023-38059
Vulnerability from cvelistv5
Published
2023-10-16 08:10
Modified
2024-09-16 16:56
Severity ?
EPSS score ?
Summary
The loading of external images is not blocked, even if configured, if the attacker uses protocol-relative URL in the payload. This can be used to retreive the IP of the user.This issue affects OTRS: from 7.0.X before 7.0.47, from 8.0.X before 8.0.37; ((OTRS)) Community Edition: from 6.0.X through 6.0.34.
References
Impacted products
Vendor | Product | Version | |||||
---|---|---|---|---|---|---|---|
▼ | OTRS AG | OTRS |
Version: 7.0.x Version: 8.0.x |
||||
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T17:30:13.552Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://otrs.com/release-notes/otrs-security-advisory-2023-08/" } ], "title": "CVE Program Container" }, { "metrics": [ { "other": { "content": { "id": "CVE-2023-38059", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-09-16T16:56:02.147025Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-09-16T16:56:26.630Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "affected", "modules": [ "Agent Interface" ], "product": "OTRS", "vendor": "OTRS AG", "versions": [ { "lessThan": "7.0.47", "status": "affected", "version": "7.0.x", "versionType": "Patch" }, { "lessThan": "8.0.37", "status": "affected", "version": "8.0.x", "versionType": "Patch" } ] }, { "defaultStatus": "unaffected", "modules": [ "Agent Interface" ], "product": "((OTRS)) Community Edition", "vendor": "OTRS AG", "versions": [ { "lessThanOrEqual": "6.0.34", "status": "affected", "version": "6.0.x", "versionType": "All" } ] } ], "credits": [ { "lang": "en", "type": "finder", "value": "Special thanks to Tim P\u00fcttmanns for reporting these vulnerability." } ], "datePublic": "2023-10-16T07:00:00.000Z", "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "The loading of external images is not blocked, even if configured, if the attacker uses protocol-relative URL in the payload. This can be used to retreive the IP of the user.\u003cp\u003eThis issue affects OTRS: from 7.0.X before 7.0.47, from 8.0.X before 8.0.37; ((OTRS)) Community Edition: from 6.0.X through 6.0.34.\u003c/p\u003e" } ], "value": "The loading of external images is not blocked, even if configured, if the attacker uses protocol-relative URL in the payload. This can be used to retreive the IP of the user.This issue affects OTRS: from 7.0.X before 7.0.47, from 8.0.X before 8.0.37; ((OTRS)) Community Edition: from 6.0.X through 6.0.34.\n\n" } ], "impacts": [ { "capecId": "CAPEC-37", "descriptions": [ { "lang": "en", "value": "CAPEC-37 Retrieve Embedded Sensitive Data" } ] } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-200", "description": "CWE-200 Exposure of Sensitive Information to an Unauthorized Actor", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2023-10-16T08:10:44.014Z", "orgId": "2e1bf29f-dc29-4ed8-830c-7b9348b6f0e8", "shortName": "OTRS" }, "references": [ { "url": "https://otrs.com/release-notes/otrs-security-advisory-2023-08/" } ], "solutions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "Update to OTRS 8.0.37 or OTRS 7.0.47\u003cbr\u003e" } ], "value": "Update to OTRS 8.0.37 or OTRS 7.0.47\n" } ], "source": { "advisory": "OSA-2023-08", "defect": [ "Issue#1185", "Ticket#2023041342000623" ], "discovery": "EXTERNAL" }, "title": "External pictures can be loaded even if not allowed by configuration", "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "2e1bf29f-dc29-4ed8-830c-7b9348b6f0e8", "assignerShortName": "OTRS", "cveId": "CVE-2023-38059", "datePublished": "2023-10-16T08:10:44.014Z", "dateReserved": "2023-07-12T08:05:38.780Z", "dateUpdated": "2024-09-16T16:56:26.630Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2021-36095
Vulnerability from cvelistv5
Published
2021-09-06 13:15
Modified
2024-09-16 17:58
Severity ?
EPSS score ?
Summary
Malicious attacker is able to find out valid user logins by using the "lost password" feature. This issue affects: OTRS AG ((OTRS)) Community Edition version 6.0.1 and later versions. OTRS AG OTRS 7.0.x version 7.0.28 and prior versions.
References
▼ | URL | Tags |
---|---|---|
https://otrs.com/release-notes/otrs-security-advisory-2021-18/ | x_refsource_CONFIRM |
Impacted products
Vendor | Product | Version | |||||
---|---|---|---|---|---|---|---|
▼ | OTRS AG | ((OTRS)) Community Edition |
Version: 6.0.1 < unspecified |
||||
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T00:47:43.852Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://otrs.com/release-notes/otrs-security-advisory-2021-18/" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "((OTRS)) Community Edition", "vendor": "OTRS AG", "versions": [ { "lessThan": "unspecified", "status": "affected", "version": "6.0.1", "versionType": "custom" } ] }, { "product": "OTRS", "vendor": "OTRS AG", "versions": [ { "lessThanOrEqual": "7.0.28", "status": "affected", "version": "7.0.x", "versionType": "custom" } ] } ], "datePublic": "2021-09-06T00:00:00", "descriptions": [ { "lang": "en", "value": "Malicious attacker is able to find out valid user logins by using the \"lost password\" feature. This issue affects: OTRS AG ((OTRS)) Community Edition version 6.0.1 and later versions. OTRS AG OTRS 7.0.x version 7.0.28 and prior versions." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-200", "description": "CWE-200 Information Exposure", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2021-09-06T13:15:27", "orgId": "2e1bf29f-dc29-4ed8-830c-7b9348b6f0e8", "shortName": "OTRS" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "https://otrs.com/release-notes/otrs-security-advisory-2021-18/" } ], "solutions": [ { "lang": "en", "value": "Update to OTRS 7.0.29." } ], "source": { "advisory": "OSA-2021-18", "defect": [ "2021062442001389" ], "discovery": "USER" }, "title": "User enumeration issue using \"lost password\" feature", "x_generator": { "engine": "Vulnogram 0.0.9" }, "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "security@otrs.com", "DATE_PUBLIC": "2021-09-06T00:00:00.000Z", "ID": "CVE-2021-36095", "STATE": "PUBLIC", "TITLE": "User enumeration issue using \"lost password\" feature" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "((OTRS)) Community Edition", "version": { "version_data": [ { "version_affected": "\u003e=", "version_value": "6.0.1" } ] } }, { "product_name": "OTRS", "version": { "version_data": [ { "version_affected": "\u003c=", "version_name": "7.0.x", "version_value": "7.0.28" } ] } } ] }, "vendor_name": "OTRS AG" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Malicious attacker is able to find out valid user logins by using the \"lost password\" feature. This issue affects: OTRS AG ((OTRS)) Community Edition version 6.0.1 and later versions. OTRS AG OTRS 7.0.x version 7.0.28 and prior versions." } ] }, "generator": { "engine": "Vulnogram 0.0.9" }, "impact": { "cvss": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N", "version": "3.1" } }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "CWE-200 Information Exposure" } ] } ] }, "references": { "reference_data": [ { "name": "https://otrs.com/release-notes/otrs-security-advisory-2021-18/", "refsource": "CONFIRM", "url": "https://otrs.com/release-notes/otrs-security-advisory-2021-18/" } ] }, "solution": [ { "lang": "en", "value": "Update to OTRS 7.0.29." } ], "source": { "advisory": "OSA-2021-18", "defect": [ "2021062442001389" ], "discovery": "USER" } } } }, "cveMetadata": { "assignerOrgId": "2e1bf29f-dc29-4ed8-830c-7b9348b6f0e8", "assignerShortName": "OTRS", "cveId": "CVE-2021-36095", "datePublished": "2021-09-06T13:15:27.220553Z", "dateReserved": "2021-07-01T00:00:00", "dateUpdated": "2024-09-16T17:58:45.926Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2022-0473
Vulnerability from cvelistv5
Published
2022-02-07 10:25
Modified
2024-09-16 23:01
Severity ?
EPSS score ?
Summary
OTRS administrators can configure dynamic field and inject malicious JavaScript code in the error message of the regular expression check. When used in the agent interface, malicious code might be exectued in the browser. This issue affects: OTRS AG OTRS 7.0.x version: 7.0.31 and prior versions.
References
▼ | URL | Tags |
---|---|---|
https://otrs.com/release-notes/otrs-security-advisory-2022-01/ | x_refsource_CONFIRM |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T23:32:45.306Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://otrs.com/release-notes/otrs-security-advisory-2022-01/" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "OTRS", "vendor": "OTRS AG", "versions": [ { "lessThanOrEqual": "7.0.31", "status": "affected", "version": "7.0.x", "versionType": "custom" } ] } ], "datePublic": "2022-02-07T00:00:00", "descriptions": [ { "lang": "en", "value": "OTRS administrators can configure dynamic field and inject malicious JavaScript code in the error message of the regular expression check. When used in the agent interface, malicious code might be exectued in the browser. This issue affects: OTRS AG OTRS 7.0.x version: 7.0.31 and prior versions." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 3.8, "baseSeverity": "LOW", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "HIGH", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:L/I:L/A:N", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-79", "description": "CWE-79 Cross-site Scripting (XSS)", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2022-02-07T10:25:11", "orgId": "2e1bf29f-dc29-4ed8-830c-7b9348b6f0e8", "shortName": "OTRS" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "https://otrs.com/release-notes/otrs-security-advisory-2022-01/" } ], "solutions": [ { "lang": "en", "value": "Update to OTRS 7.0.32" } ], "source": { "advisory": "OSA-2022-01", "defect": [ "2021093042002361" ], "discovery": "USER" }, "title": "Dynamic field error message is vulnerable to XSS", "x_generator": { "engine": "Vulnogram 0.0.9" }, "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "security@otrs.com", "DATE_PUBLIC": "2022-02-07T09:00:00.000Z", "ID": "CVE-2022-0473", "STATE": "PUBLIC", "TITLE": "Dynamic field error message is vulnerable to XSS" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "OTRS", "version": { "version_data": [ { "version_affected": "\u003c=", "version_name": "7.0.x", "version_value": "7.0.31" } ] } } ] }, "vendor_name": "OTRS AG" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "OTRS administrators can configure dynamic field and inject malicious JavaScript code in the error message of the regular expression check. When used in the agent interface, malicious code might be exectued in the browser. This issue affects: OTRS AG OTRS 7.0.x version: 7.0.31 and prior versions." } ] }, "generator": { "engine": "Vulnogram 0.0.9" }, "impact": { "cvss": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 3.8, "baseSeverity": "LOW", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "HIGH", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:L/I:L/A:N", "version": "3.1" } }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "CWE-79 Cross-site Scripting (XSS)" } ] } ] }, "references": { "reference_data": [ { "name": "https://otrs.com/release-notes/otrs-security-advisory-2022-01/", "refsource": "CONFIRM", "url": "https://otrs.com/release-notes/otrs-security-advisory-2022-01/" } ] }, "solution": [ { "lang": "en", "value": "Update to OTRS 7.0.32" } ], "source": { "advisory": "OSA-2022-01", "defect": [ "2021093042002361" ], "discovery": "USER" } } } }, "cveMetadata": { "assignerOrgId": "2e1bf29f-dc29-4ed8-830c-7b9348b6f0e8", "assignerShortName": "OTRS", "cveId": "CVE-2022-0473", "datePublished": "2022-02-07T10:25:11.723196Z", "dateReserved": "2022-02-02T00:00:00", "dateUpdated": "2024-09-16T23:01:44.721Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2022-39052
Vulnerability from cvelistv5
Published
2022-10-17 08:55
Modified
2024-09-16 18:33
Severity ?
EPSS score ?
Summary
An external attacker is able to send a specially crafted email (with many recipients) and trigger a potential DoS of the system
References
Impacted products
Vendor | Product | Version | |||||
---|---|---|---|---|---|---|---|
▼ | OTRS AG | OTRS |
Version: 7.0.x < Version: 8.0.x < |
||||
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T11:10:32.409Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://otrs.com/release-notes/otrs-security-advisory-2022-13/" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "OTRS", "vendor": "OTRS AG", "versions": [ { "lessThanOrEqual": "7.0.39", "status": "affected", "version": "7.0.x", "versionType": "custom" }, { "lessThanOrEqual": "8.0.26", "status": "affected", "version": "8.0.x", "versionType": "custom" } ] }, { "product": "((OTRS)) Community Edition", "vendor": "OTRS AG", "versions": [ { "lessThan": "6.0.x*", "status": "affected", "version": "6.0.1", "versionType": "custom" } ] } ], "datePublic": "2022-10-17T00:00:00", "descriptions": [ { "lang": "en", "value": "An external attacker is able to send a specially crafted email (with many recipients) and trigger a potential DoS of the system" } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-835", "description": "CWE-835 Loop with Unreachable Exit Condition (\u0027Infinite Loop\u0027)", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2022-10-17T00:00:00", "orgId": "2e1bf29f-dc29-4ed8-830c-7b9348b6f0e8", "shortName": "OTRS" }, "references": [ { "url": "https://otrs.com/release-notes/otrs-security-advisory-2022-13/" } ], "solutions": [ { "lang": "en", "value": "Update to OTRS 8.0.26 or OTRS 7.0.38." } ], "source": { "advisory": "OSA-2022-13", "defect": [ "2022070642001105" ], "discovery": "USER" }, "title": "DoS attack using email", "x_generator": { "engine": "vulnogram 0.1.0-rc1" } } }, "cveMetadata": { "assignerOrgId": "2e1bf29f-dc29-4ed8-830c-7b9348b6f0e8", "assignerShortName": "OTRS", "cveId": "CVE-2022-39052", "datePublished": "2022-10-17T08:55:10.047405Z", "dateReserved": "2022-08-31T00:00:00", "dateUpdated": "2024-09-16T18:33:43.971Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2023-6254
Vulnerability from cvelistv5
Published
2023-11-27 09:44
Modified
2024-10-15 17:45
Severity ?
EPSS score ?
Summary
A Vulnerability in OTRS AgentInterface and ExternalInterface allows the reading of plain text passwords which are send back to the client in the server response-
This issue affects OTRS: from 8.0.X through 8.0.37.
References
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T08:28:20.391Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://otrs.com/release-notes/otrs-security-advisory-2023-11/" } ], "title": "CVE Program Container" }, { "metrics": [ { "other": { "content": { "id": "CVE-2023-6254", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "total" } ], "role": "CISA Coordinator", "timestamp": "2024-10-15T17:15:14.848049Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-10-15T17:45:11.912Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "modules": [ "AgentInterface", "ExternalInterface" ], "product": "OTRS", "vendor": "OTRS AG", "versions": [ { "lessThanOrEqual": "8.0.37", "status": "affected", "version": "8.0.x", "versionType": "Patch" } ] } ], "credits": [ { "lang": "en", "type": "reporter", "value": "Special thanks to Matthias P\u00fcschel for reporting these vulnerability." } ], "datePublic": "2023-11-27T08:00:00.000Z", "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "A Vulnerability in OTRS AgentInterface and ExternalInterface allows the reading of plain text passwords which are send back to the client in the server response-\u003cbr\u003e\u003cp\u003eThis issue affects OTRS: from 8.0.X through 8.0.37.\u003c/p\u003e" } ], "value": "A Vulnerability in OTRS AgentInterface and ExternalInterface allows the reading of plain text passwords which are send back to the client in the server response-\nThis issue affects OTRS: from 8.0.X through 8.0.37.\n\n" } ], "impacts": [ { "capecId": "CAPEC-555", "descriptions": [ { "lang": "en", "value": "CAPEC-555 Remote Services with Stolen Credentials" } ] } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "ADJACENT_NETWORK", "availabilityImpact": "NONE", "baseScore": 8.1, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-522", "description": "CWE-522 Insufficiently Protected Credentials", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2023-11-27T09:44:00.273Z", "orgId": "2e1bf29f-dc29-4ed8-830c-7b9348b6f0e8", "shortName": "OTRS" }, "references": [ { "url": "https://otrs.com/release-notes/otrs-security-advisory-2023-11/" } ], "solutions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "Update to OTRS Patch 2023.1.1\u003cbr\u003e" } ], "value": "Update to OTRS Patch 2023.1.1\n" } ], "source": { "advisory": "OSA-2023-11", "defect": [ "Issue#1390", "Ticket#2023083042000825" ], "discovery": "USER" }, "title": "Password is send back to client", "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "2e1bf29f-dc29-4ed8-830c-7b9348b6f0e8", "assignerShortName": "OTRS", "cveId": "CVE-2023-6254", "datePublished": "2023-11-27T09:44:00.273Z", "dateReserved": "2023-11-22T12:14:39.322Z", "dateUpdated": "2024-10-15T17:45:11.912Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2020-1773
Vulnerability from cvelistv5
Published
2020-03-27 12:47
Modified
2024-09-16 23:27
Severity ?
EPSS score ?
Summary
An attacker with the ability to generate session IDs or password reset tokens, either by being able to authenticate or by exploiting OSA-2020-09, may be able to predict other users session IDs, password reset tokens and automatically generated passwords. This issue affects ((OTRS)) Community Edition: 5.0.41 and prior versions, 6.0.26 and prior versions. OTRS; 7.0.15 and prior versions.
References
Impacted products
Vendor | Product | Version | |||||
---|---|---|---|---|---|---|---|
▼ | OTRS AG | ((OTRS)) Community Edition |
Version: 5.0.41 and prior Version: 6.0.26 and prior |
||||
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T06:46:30.934Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://otrs.com/release-notes/otrs-security-advisory-2020-10/" }, { "name": "openSUSE-SU-2020:0551", "tags": [ "vendor-advisory", "x_transferred" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2020-04/msg00038.html" }, { "name": "openSUSE-SU-2020:1475", "tags": [ "vendor-advisory", "x_transferred" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00066.html" }, { "name": "openSUSE-SU-2020:1509", "tags": [ "vendor-advisory", "x_transferred" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00077.html" }, { "name": "[debian-lts-announce] 20230831 [SECURITY] [DLA 3551-1] otrs2 security update", "tags": [ "mailing-list", "x_transferred" ], "url": "https://lists.debian.org/debian-lts-announce/2023/08/msg00040.html" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "((OTRS)) Community Edition", "vendor": "OTRS AG", "versions": [ { "status": "affected", "version": "5.0.41 and prior" }, { "status": "affected", "version": "6.0.26 and prior" } ] }, { "product": "OTRS", "vendor": "OTRS AG", "versions": [ { "status": "affected", "version": "7.0.15 and prior" } ] } ], "credits": [ { "lang": "en", "value": "Fabian Henneke" } ], "datePublic": "2020-03-27T00:00:00", "descriptions": [ { "lang": "en", "value": "An attacker with the ability to generate session IDs or password reset tokens, either by being able to authenticate or by exploiting OSA-2020-09, may be able to predict other users session IDs, password reset tokens and automatically generated passwords. This issue affects ((OTRS)) Community Edition: 5.0.41 and prior versions, 6.0.26 and prior versions. OTRS; 7.0.15 and prior versions." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 7.3, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:N", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-331", "description": "CWE-331 Insufficient Entropy", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2023-08-31T02:06:15.836917", "orgId": "2e1bf29f-dc29-4ed8-830c-7b9348b6f0e8", "shortName": "OTRS" }, "references": [ { "url": "https://otrs.com/release-notes/otrs-security-advisory-2020-10/" }, { "name": "openSUSE-SU-2020:0551", "tags": [ "vendor-advisory" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2020-04/msg00038.html" }, { "name": "openSUSE-SU-2020:1475", "tags": [ "vendor-advisory" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00066.html" }, { "name": "openSUSE-SU-2020:1509", "tags": [ "vendor-advisory" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00077.html" }, { "name": "[debian-lts-announce] 20230831 [SECURITY] [DLA 3551-1] otrs2 security update", "tags": [ "mailing-list" ], "url": "https://lists.debian.org/debian-lts-announce/2023/08/msg00040.html" } ], "solutions": [ { "lang": "en", "value": "Upgrade to OTRS 7.0.16, ((OTRS)) Community Edition 6.0.27, 5.0.42\n\nPatch for ((OTRS)) Community Edition 6: https://github.com/OTRS/otrs/commit/ab253734bc211541309b9f8ea2b8b70389c4a64e\nPatch for ((OTRS)) Community Edition 5: https://github.com/OTRS/otrs/commit/4955521af50238046847bce51ad9865950324f77" } ], "source": { "advisory": "OSA-2020-10", "defect": [ "2020012742001563" ], "discovery": "EXTERNAL" }, "title": "Session / Password / Password token leak", "x_generator": { "engine": "Vulnogram 0.0.9" } } }, "cveMetadata": { "assignerOrgId": "2e1bf29f-dc29-4ed8-830c-7b9348b6f0e8", "assignerShortName": "OTRS", "cveId": "CVE-2020-1773", "datePublished": "2020-03-27T12:47:49.545851Z", "dateReserved": "2019-11-29T00:00:00", "dateUpdated": "2024-09-16T23:27:05.434Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2020-1768
Vulnerability from cvelistv5
Published
2020-02-07 15:42
Modified
2024-09-16 19:09
Severity ?
EPSS score ?
Summary
The external frontend system uses numerous background calls to the backend. Each background request is treated as user activity so the SessionMaxIdleTime will not be reached. This issue affects: OTRS 7.0.x version 7.0.14 and prior versions.
References
▼ | URL | Tags |
---|---|---|
https://otrs.com/release-notes/otrs-security-advisory-2020-04/ | x_refsource_CONFIRM |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T06:46:30.900Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://otrs.com/release-notes/otrs-security-advisory-2020-04/" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "OTRS", "vendor": "OTRS AG", "versions": [ { "lessThanOrEqual": "7.0.14", "status": "affected", "version": "7.0.x", "versionType": "custom" } ] } ], "datePublic": "2020-02-07T00:00:00", "descriptions": [ { "lang": "en", "value": "The external frontend system uses numerous background calls to the backend. Each background request is treated as user activity so the SessionMaxIdleTime will not be reached. This issue affects: OTRS 7.0.x version 7.0.14 and prior versions." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "LOW", "baseScore": 5.4, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:L", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-613", "description": "CWE-613 Insufficient Session Expiration", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2020-02-07T15:42:29", "orgId": "2e1bf29f-dc29-4ed8-830c-7b9348b6f0e8", "shortName": "OTRS" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "https://otrs.com/release-notes/otrs-security-advisory-2020-04/" } ], "solutions": [ { "lang": "en", "value": "Upgrade to OTRS 7.0.15" } ], "source": { "advisory": "OSA-2020-04", "defect": [ "2020011342001517" ], "discovery": "USER" }, "title": "External Interface does not invalidate session", "x_generator": { "engine": "Vulnogram 0.0.9" }, "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "security@otrs.com", "DATE_PUBLIC": "2020-02-07T00:00:00.000Z", "ID": "CVE-2020-1768", "STATE": "PUBLIC", "TITLE": "External Interface does not invalidate session" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "OTRS", "version": { "version_data": [ { "version_affected": "\u003c=", "version_name": "7.0.x", "version_value": "7.0.14" } ] } } ] }, "vendor_name": "OTRS AG" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "The external frontend system uses numerous background calls to the backend. Each background request is treated as user activity so the SessionMaxIdleTime will not be reached. This issue affects: OTRS 7.0.x version 7.0.14 and prior versions." } ] }, "generator": { "engine": "Vulnogram 0.0.9" }, "impact": { "cvss": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "LOW", "baseScore": 5.4, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:L", "version": "3.1" } }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "CWE-613 Insufficient Session Expiration" } ] } ] }, "references": { "reference_data": [ { "name": "https://otrs.com/release-notes/otrs-security-advisory-2020-04/", "refsource": "CONFIRM", "url": "https://otrs.com/release-notes/otrs-security-advisory-2020-04/" } ] }, "solution": [ { "lang": "en", "value": "Upgrade to OTRS 7.0.15" } ], "source": { "advisory": "OSA-2020-04", "defect": [ "2020011342001517" ], "discovery": "USER" } } } }, "cveMetadata": { "assignerOrgId": "2e1bf29f-dc29-4ed8-830c-7b9348b6f0e8", "assignerShortName": "OTRS", "cveId": "CVE-2020-1768", "datePublished": "2020-02-07T15:42:29.087385Z", "dateReserved": "2019-11-29T00:00:00", "dateUpdated": "2024-09-16T19:09:28.404Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2024-43442
Vulnerability from cvelistv5
Published
2024-08-26 08:42
Modified
2024-08-26 15:27
Severity ?
EPSS score ?
Summary
Improper Neutralization of Input done by an attacker with admin privileges ('Cross-site Scripting') in OTRS (System Configuration modules) and ((OTRS)) Community Edition allows Cross-Site Scripting (XSS) within the System Configuration targeting other admins.
This issue affects:
* OTRS from 7.0.X through 7.0.50
* OTRS 8.0.X
* OTRS 2023.X
* OTRS from 2024.X through 2024.5.X
* ((OTRS)) Community Edition: 6.0.x
Products based on the ((OTRS)) Community Edition also very likely to be affected
References
Impacted products
Vendor | Product | Version | |||||
---|---|---|---|---|---|---|---|
▼ | OTRS AG | OTRS |
Version: 7.0.x Version: 8.0.x Version: 2023.x Version: 2024.x |
||||
|
{ "containers": { "adp": [ { "metrics": [ { "other": { "content": { "id": "CVE-2024-43442", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-08-26T15:26:34.955357Z", "version": "2.0.3" }, "type": "ssvc" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-79", "description": "CWE-79 Improper Neutralization of Input During Web Page Generation (\u0027Cross-site Scripting\u0027)", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-08-26T15:27:15.700Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "modules": [ "System Configuration" ], "product": "OTRS", "vendor": "OTRS AG", "versions": [ { "lessThanOrEqual": "7.0.50", "status": "affected", "version": "7.0.x", "versionType": "Patch" }, { "status": "affected", "version": "8.0.x" }, { "status": "affected", "version": "2023.x" }, { "lessThanOrEqual": "2024.5.x", "status": "affected", "version": "2024.x", "versionType": "Patch" } ] }, { "defaultStatus": "affected", "product": "((OTRS)) Community Edition", "vendor": "OTRS AG", "versions": [ { "status": "affected", "version": "6.0.x" } ] } ], "credits": [ { "lang": "en", "type": "reporter", "value": "Special thanks to Marek Holka for reporting these vulnerability." } ], "datePublic": "2024-08-26T08:00:00.000Z", "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "Improper Neutralization of Input done by an attacker with admin privileges (\u0027Cross-site Scripting\u0027) in\u0026nbsp; OTRS (System Configuration modules) and ((OTRS)) Community Edition allows Cross-Site Scripting (XSS) within the System Configuration targeting other admins.\u003cbr\u003e\u003cp\u003eThis issue affects:\u0026nbsp;\u003c/p\u003e\u003cul\u003e\u003cli\u003eOTRS from 7.0.X through 7.0.50\u003c/li\u003e\u003cli\u003eOTRS 8.0.X\u003c/li\u003e\u003cli\u003eOTRS 2023.X\u003c/li\u003e\u003cli\u003eOTRS from 2024.X through 2024.5.X\u003c/li\u003e\u003cli\u003e((OTRS)) Community Edition: 6.0.x\u003cbr\u003e\u003c/li\u003e\u003c/ul\u003e\u003cdiv\u003eProducts based on the ((OTRS)) Community Edition also very likely to be affected\u003cbr\u003e\u003c/div\u003e" } ], "value": "Improper Neutralization of Input done by an attacker with admin privileges (\u0027Cross-site Scripting\u0027) in\u00a0 OTRS (System Configuration modules) and ((OTRS)) Community Edition allows Cross-Site Scripting (XSS) within the System Configuration targeting other admins.\nThis issue affects:\u00a0\n\n * OTRS from 7.0.X through 7.0.50\n * OTRS 8.0.X\n * OTRS 2023.X\n * OTRS from 2024.X through 2024.5.X\n * ((OTRS)) Community Edition: 6.0.x\n\nProducts based on the ((OTRS)) Community Edition also very likely to be affected" } ], "impacts": [ { "capecId": "CAPEC-63", "descriptions": [ { "lang": "en", "value": "CAPEC-63 Cross-Site Scripting (XSS)" } ] } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 4.9, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "HIGH", "privilegesRequired": "HIGH", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:H/A:N", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-790", "description": "CWE-790 Improper Filtering of Special Elements", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-08-26T08:42:39.842Z", "orgId": "2e1bf29f-dc29-4ed8-830c-7b9348b6f0e8", "shortName": "OTRS" }, "references": [ { "url": "https://otrs.com/release-notes/otrs-security-advisory-2024-10/" } ], "solutions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "Update to OTRS 2024.6.x or OTRS 7.0.51\u003cbr\u003e" } ], "value": "Update to OTRS 2024.6.x or OTRS 7.0.51" } ], "source": { "advisory": "OSA-2024-10", "defect": [ "Ticket#2024061942000965", "Issue#2592" ], "discovery": "EXTERNAL" }, "title": "Stored XSS in System Configuration", "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "2e1bf29f-dc29-4ed8-830c-7b9348b6f0e8", "assignerShortName": "OTRS", "cveId": "CVE-2024-43442", "datePublished": "2024-08-26T08:42:39.842Z", "dateReserved": "2024-08-13T13:38:47.972Z", "dateUpdated": "2024-08-26T15:27:15.700Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2023-5422
Vulnerability from cvelistv5
Published
2023-10-16 08:10
Modified
2024-09-16 17:02
Severity ?
EPSS score ?
Summary
The functions to fetch e-mail via POP3 or IMAP as well as sending e-mail via SMTP use OpenSSL for static SSL or TLS based communication. As the
SSL_get_verify_result() function is not used the certificated is trusted always and it can not be ensured that the certificate
satisfies all necessary security requirements.
This could allow an
attacker to use an invalid certificate to claim to be a trusted host,
use expired certificates, or conduct other attacks that could be
detected if the certificate is properly validated.
This issue affects OTRS: from 7.0.X before 7.0.47, from 8.0.X before 8.0.37; ((OTRS)) Community Edition: from 6.0.X through 6.0.34.
References
Impacted products
Vendor | Product | Version | |||||
---|---|---|---|---|---|---|---|
▼ | OTRS AG | OTRS |
Version: 7.0.x Version: 8.0.x |
||||
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T07:59:44.689Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://otrs.com/release-notes/otrs-security-advisory-2023-10/" } ], "title": "CVE Program Container" }, { "affected": [ { "cpes": [ "cpe:2.3:a:otrs_ag:otrs:*:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "otrs", "vendor": "otrs_ag", "versions": [ { "lessThan": "7.0.47", "status": "affected", "version": "7.0.x", "versionType": "custom" }, { "lessThan": "8.0.37", "status": "affected", "version": "8.0.x", "versionType": "custom" } ] }, { "cpes": [ "cpe:2.3:a:otrs_community_edition:otrs_community_edition:*:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "otrs_community_edition", "vendor": "otrs_community_edition", "versions": [ { "lessThan": "6.0.34", "status": "affected", "version": "6.0x", "versionType": "custom" } ] } ], "metrics": [ { "other": { "content": { "id": "CVE-2023-5422", "options": [ { "Exploitation": "none" }, { "Automatable": "yes" }, { "Technical Impact": "total" } ], "role": "CISA Coordinator", "timestamp": "2024-09-16T16:57:40.338711Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-09-16T17:02:52.542Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "affected", "modules": [ "E-Mail Backend" ], "product": "OTRS", "vendor": "OTRS AG", "versions": [ { "lessThan": "7.0.47", "status": "affected", "version": "7.0.x", "versionType": "Patch" }, { "lessThan": "8.0.37", "status": "affected", "version": "8.0.x", "versionType": "Patch" } ] }, { "defaultStatus": "affected", "modules": [ "E-Mail Backend" ], "product": "((OTRS)) Community Edition", "vendor": "OTRS AG", "versions": [ { "lessThanOrEqual": "6.0.34", "status": "affected", "version": "6.0.x", "versionType": "All" } ] } ], "credits": [ { "lang": "en", "type": "reporter", "value": "Special thanks to Matthias Terlinde for reporting these vulnerability." } ], "datePublic": "2023-10-16T07:00:00.000Z", "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "\u003cdiv\u003eThe functions to fetch e-mail via POP3 or IMAP as well as sending e-mail via SMTP use OpenSSL for static SSL or TLS based communication. As the \nSSL_get_verify_result() function is not used the certificated is trusted always and it can not be ensured that the certificate \nsatisfies all necessary security requirements.\u003c/div\u003e\u003cdiv\u003e\u003cbr\u003e\u003c/div\u003e\u003cdiv\u003eThis could allow an \nattacker to use an invalid certificate to claim to be a trusted host, \nuse expired certificates, or conduct other attacks that could be \ndetected if the certificate is properly validated.\u003c/div\u003e\u003cdiv\u003e\u003cbr\u003e\u003c/div\u003e\u003cdiv\u003eThis issue affects OTRS: from 7.0.X before 7.0.47, from 8.0.X before 8.0.37; ((OTRS)) Community Edition: from 6.0.X through 6.0.34.\u003cbr\u003e\u003c/div\u003e\u003cdiv\u003e\u003cbr\u003e\u003c/div\u003e" } ], "value": "The functions to fetch e-mail via POP3 or IMAP as well as sending e-mail via SMTP use OpenSSL for static SSL or TLS based communication. As the \nSSL_get_verify_result() function is not used the certificated is trusted always and it can not be ensured that the certificate \nsatisfies all necessary security requirements.\n\nThis could allow an \nattacker to use an invalid certificate to claim to be a trusted host, \nuse expired certificates, or conduct other attacks that could be \ndetected if the certificate is properly validated.\n\nThis issue affects OTRS: from 7.0.X before 7.0.47, from 8.0.X before 8.0.37; ((OTRS)) Community Edition: from 6.0.X through 6.0.34.\n\n" } ], "impacts": [ { "capecId": "CAPEC-475", "descriptions": [ { "lang": "en", "value": "CAPEC-475 Signature Spoofing by Improper Validation" } ] } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 8.7, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:N", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-295", "description": "CWE-295 Improper Certificate Validation", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2023-10-16T08:10:35.192Z", "orgId": "2e1bf29f-dc29-4ed8-830c-7b9348b6f0e8", "shortName": "OTRS" }, "references": [ { "url": "https://otrs.com/release-notes/otrs-security-advisory-2023-10/" } ], "solutions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "\nUpdate to OTRS 7.0.47 or 8.0.37\n\u003cbr\u003e" } ], "value": "Update to OTRS 7.0.47 or 8.0.37\n\n" } ], "source": { "advisory": "OSA-2023-10", "defect": [ "Issue#21", "Issue#44", "Ticket#2022062142000679", "Ticket#2022061542000654" ], "discovery": "USER" }, "title": "SSL Certificates are not checked for E-Mail Handling", "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "2e1bf29f-dc29-4ed8-830c-7b9348b6f0e8", "assignerShortName": "OTRS", "cveId": "CVE-2023-5422", "datePublished": "2023-10-16T08:10:35.192Z", "dateReserved": "2023-10-05T08:12:18.101Z", "dateUpdated": "2024-09-16T17:02:52.542Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2022-4427
Vulnerability from cvelistv5
Published
2022-12-19 08:09
Modified
2024-08-03 01:41
Severity ?
EPSS score ?
Summary
Improper Input Validation vulnerability in OTRS AG OTRS, OTRS AG ((OTRS)) Community Edition allows SQL Injection via TicketSearch Webservice
This issue affects OTRS: from 7.0.1 before 7.0.40 Patch 1, from 8.0.1 before 8.0.28 Patch 1; ((OTRS)) Community Edition: from 6.0.1 through 6.0.34.
References
Impacted products
Vendor | Product | Version | |||||
---|---|---|---|---|---|---|---|
▼ | OTRS AG | OTRS |
Version: 7.0.1 Version: 8.0.1 |
||||
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T01:41:44.619Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://otrs.com/release-notes/otrs-security-advisory-2022-15/" }, { "tags": [ "x_transferred" ], "url": "https://lists.debian.org/debian-lts-announce/2023/08/msg00040.html" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "defaultStatus": "affected", "modules": [ "Generic Interface" ], "product": "OTRS", "vendor": "OTRS AG", "versions": [ { "lessThan": "7.0.40 Patch 1", "status": "affected", "version": "7.0.1", "versionType": "Patch 1 (2022-12-19)" }, { "lessThan": "8.0.28 Patch 1", "status": "affected", "version": "8.0.1", "versionType": "Patch 1 (2022-12-19)" } ] }, { "defaultStatus": "affected", "modules": [ "Generic Interface" ], "product": "((OTRS)) Community Edition", "vendor": "OTRS AG", "versions": [ { "lessThanOrEqual": "6.0.34", "status": "affected", "version": "6.0.1", "versionType": "All" } ] } ], "configurations": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "TicketSearch Webservice has to be configured\u003cbr\u003e" } ], "value": "TicketSearch Webservice has to be configured\n" } ], "credits": [ { "lang": "en", "type": "reporter", "user": "00000000-0000-4000-9000-000000000000", "value": "Special thanks to Tim P\u00fcttmanns for reporting these vulnerability." } ], "datePublic": "2022-12-19T08:00:00.000Z", "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "Improper Input Validation vulnerability in OTRS AG OTRS, OTRS AG ((OTRS)) Community Edition allows SQL Injection via TicketSearch Webservice\u003cbr\u003e\u003cp\u003eThis issue affects OTRS: from 7.0.1 before 7.0.40 Patch 1, from 8.0.1 before 8.0.28 Patch 1; ((OTRS)) Community Edition: from 6.0.1 through 6.0.34.\u003c/p\u003e" } ], "value": "Improper Input Validation vulnerability in OTRS AG OTRS, OTRS AG ((OTRS)) Community Edition allows SQL Injection via TicketSearch Webservice\nThis issue affects OTRS: from 7.0.1 before 7.0.40 Patch 1, from 8.0.1 before 8.0.28 Patch 1; ((OTRS)) Community Edition: from 6.0.1 through 6.0.34.\n\n" } ], "impacts": [ { "capecId": "CAPEC-66", "descriptions": [ { "lang": "en", "value": "CAPEC-66 SQL Injection" } ] } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-20", "description": "CWE-20 Improper Input Validation", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2022-12-19T08:09:51.646Z", "orgId": "2e1bf29f-dc29-4ed8-830c-7b9348b6f0e8", "shortName": "OTRS" }, "references": [ { "url": "https://otrs.com/release-notes/otrs-security-advisory-2022-15/" }, { "url": "https://lists.debian.org/debian-lts-announce/2023/08/msg00040.html" } ], "solutions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "Update to OTRS 7.0.40 Patch 1 or OTRS 8.0.28 Patch 1 released on 19th December 2022\u003cbr\u003e" } ], "value": "Update to OTRS 7.0.40 Patch 1 or OTRS 8.0.28 Patch 1 released on 19th December 2022\n" } ], "source": { "advisory": "OSA-2022-15", "discovery": "EXTERNAL" }, "title": "SQL Injection via OTRS Search API", "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "2e1bf29f-dc29-4ed8-830c-7b9348b6f0e8", "assignerShortName": "OTRS", "cveId": "CVE-2022-4427", "datePublished": "2022-12-19T08:09:51.646Z", "dateReserved": "2022-12-12T16:11:40.741Z", "dateUpdated": "2024-08-03T01:41:44.619Z", "requesterUserId": "e1930910-48a6-4f4e-9306-261ea8c0e8b1", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2020-1778
Vulnerability from cvelistv5
Published
2020-11-23 15:32
Modified
2024-09-16 23:40
Severity ?
EPSS score ?
Summary
When OTRS uses multiple backends for user authentication (with LDAP), agents are able to login even if the account is set to invalid. This issue affects OTRS; 8.0.9 and prior versions.
References
▼ | URL | Tags |
---|---|---|
https://otrs.com/release-notes/otrs-security-advisory-2020-16/ | x_refsource_CONFIRM |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T06:46:30.909Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://otrs.com/release-notes/otrs-security-advisory-2020-16/" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "OTRS", "vendor": "OTRS AG", "versions": [ { "lessThanOrEqual": "8.0.9", "status": "affected", "version": "8.0.x", "versionType": "custom" } ] } ], "credits": [ { "lang": "en", "value": "L\u00e1szl\u00f3 Gyaraki" } ], "datePublic": "2020-11-23T00:00:00", "descriptions": [ { "lang": "en", "value": "When OTRS uses multiple backends for user authentication (with LDAP), agents are able to login even if the account is set to invalid. This issue affects OTRS; 8.0.9 and prior versions." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "ADJACENT_NETWORK", "availabilityImpact": "NONE", "baseScore": 4.1, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:A/AC:L/PR:L/UI:R/S:U/C:L/I:L/A:N", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-287", "description": "CWE-287 Improper Authentication", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2020-11-23T15:32:46", "orgId": "2e1bf29f-dc29-4ed8-830c-7b9348b6f0e8", "shortName": "OTRS" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "https://otrs.com/release-notes/otrs-security-advisory-2020-16/" } ], "solutions": [ { "lang": "en", "value": "Upgrade to OTRS 8.0.10" } ], "source": { "advisory": "OSA-2020-16", "defect": [ "2020111442000202" ], "discovery": "INTERNAL" }, "title": "Bypassing user account validation", "x_generator": { "engine": "Vulnogram 0.0.9" }, "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "security@otrs.com", "DATE_PUBLIC": "2020-11-23T00:00:00.000Z", "ID": "CVE-2020-1778", "STATE": "PUBLIC", "TITLE": "Bypassing user account validation" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "OTRS", "version": { "version_data": [ { "version_affected": "\u003c=", "version_name": "8.0.x", "version_value": "8.0.9" } ] } } ] }, "vendor_name": "OTRS AG" } ] } }, "credit": [ { "lang": "eng", "value": "L\u00e1szl\u00f3 Gyaraki" } ], "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "When OTRS uses multiple backends for user authentication (with LDAP), agents are able to login even if the account is set to invalid. This issue affects OTRS; 8.0.9 and prior versions." } ] }, "generator": { "engine": "Vulnogram 0.0.9" }, "impact": { "cvss": { "attackComplexity": "LOW", "attackVector": "ADJACENT_NETWORK", "availabilityImpact": "NONE", "baseScore": 4.1, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:A/AC:L/PR:L/UI:R/S:U/C:L/I:L/A:N", "version": "3.1" } }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "CWE-287 Improper Authentication" } ] } ] }, "references": { "reference_data": [ { "name": "https://otrs.com/release-notes/otrs-security-advisory-2020-16/", "refsource": "CONFIRM", "url": "https://otrs.com/release-notes/otrs-security-advisory-2020-16/" } ] }, "solution": [ { "lang": "en", "value": "Upgrade to OTRS 8.0.10" } ], "source": { "advisory": "OSA-2020-16", "defect": [ "2020111442000202" ], "discovery": "INTERNAL" } } } }, "cveMetadata": { "assignerOrgId": "2e1bf29f-dc29-4ed8-830c-7b9348b6f0e8", "assignerShortName": "OTRS", "cveId": "CVE-2020-1778", "datePublished": "2020-11-23T15:32:46.740926Z", "dateReserved": "2019-11-29T00:00:00", "dateUpdated": "2024-09-16T23:40:42.844Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2024-23792
Vulnerability from cvelistv5
Published
2024-01-29 09:20
Modified
2024-11-12 21:47
Severity ?
EPSS score ?
Summary
When adding attachments to ticket comments,
another user can add attachments as well impersonating the orginal user. The attack requires a
logged-in other user to know the UUID. While the legitimate user
completes the comment, the malicious user can add more files to the
comment.
This issue affects OTRS: from 7.0.X through 7.0.48, from 8.0.X through 8.0.37, from 2023.X through 2023.1.1.
References
▼ | URL | Tags |
---|---|---|
https://otrs.com/release-notes/otrs-security-advisory-2024-03/ | vendor-advisory |
Impacted products
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-01T23:13:07.447Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "vendor-advisory", "x_transferred" ], "url": "https://otrs.com/release-notes/otrs-security-advisory-2024-03/" } ], "title": "CVE Program Container" }, { "metrics": [ { "other": { "content": { "id": "CVE-2024-23792", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-11-12T21:46:29.598781Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-11-12T21:47:04.433Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "modules": [ "internal API" ], "product": "OTRS", "vendor": "OTRS AG", "versions": [ { "lessThanOrEqual": "7.0.48", "status": "affected", "version": "7.0.x", "versionType": "Patch" }, { "lessThanOrEqual": "8.0.37", "status": "affected", "version": "8.0.x", "versionType": "Patch" }, { "lessThanOrEqual": "2023.1.1", "status": "affected", "version": "2023.x", "versionType": "Patch" } ] } ], "credits": [ { "lang": "en", "type": "reporter", "value": "Special thanks to Matthias P\u00fcschel for reporting these vulnerability." } ], "datePublic": "2024-01-29T08:00:00.000Z", "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "\u003cp\u003eWhen adding attachments to ticket comments, \nanother user can add attachments as well impersonating the orginal user. The attack requires a \nlogged-in other user to know the UUID. While the legitimate user \ncompletes the comment, the malicious user can add more files to the \ncomment.\u003c/p\u003e\u003cp\u003eThis issue affects OTRS: from 7.0.X through 7.0.48, from 8.0.X through 8.0.37, from 2023.X through 2023.1.1.\u003c/p\u003e" } ], "value": "When adding attachments to ticket comments, \nanother user can add attachments as well impersonating the orginal user. The attack requires a \nlogged-in other user to know the UUID. While the legitimate user \ncompletes the comment, the malicious user can add more files to the \ncomment.\n\nThis issue affects OTRS: from 7.0.X through 7.0.48, from 8.0.X through 8.0.37, from 2023.X through 2023.1.1.\n\n" } ], "impacts": [ { "capecId": "CAPEC-194", "descriptions": [ { "lang": "en", "value": "CAPEC-194 Fake the Source of Data" } ] } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:N", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-287", "description": "CWE-287 Improper Authentication", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-01-29T09:20:40.920Z", "orgId": "2e1bf29f-dc29-4ed8-830c-7b9348b6f0e8", "shortName": "OTRS" }, "references": [ { "tags": [ "vendor-advisory" ], "url": "https://otrs.com/release-notes/otrs-security-advisory-2024-03/" } ], "solutions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "\u003cdiv\u003eUpdate to OTRS Patch 2024.1.1\u003c/div\u003e\u003cdiv\u003eUpdate to OTRS 7.0.49 (Long Term Support Users)\u003c/div\u003e" } ], "value": "Update to OTRS Patch 2024.1.1\n\nUpdate to OTRS 7.0.49 (Long Term Support Users)\n\n" } ], "source": { "advisory": "OSA-2024-03", "defect": [ "Issue#1392", "Ticket#2023083042000825" ], "discovery": "EXTERNAL" }, "title": "Insufficient access control", "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "2e1bf29f-dc29-4ed8-830c-7b9348b6f0e8", "assignerShortName": "OTRS", "cveId": "CVE-2024-23792", "datePublished": "2024-01-29T09:20:06.829Z", "dateReserved": "2024-01-22T10:32:00.704Z", "dateUpdated": "2024-11-12T21:47:04.433Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2021-21435
Vulnerability from cvelistv5
Published
2021-02-08 10:55
Modified
2024-09-16 22:35
Severity ?
EPSS score ?
Summary
Article Bcc fields and agent personal information are shown when customer prints the ticket (PDF) via external interface. This issue affects: OTRS AG OTRS 7.0.x version 7.0.23 and prior versions; 8.0.x version 8.0.10 and prior versions.
References
▼ | URL | Tags |
---|---|---|
https://otrs.com/release-notes/otrs-security-advisory-2021-02/ | x_refsource_CONFIRM |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T18:16:22.383Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://otrs.com/release-notes/otrs-security-advisory-2021-02/" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "OTRS", "vendor": "OTRS AG", "versions": [ { "lessThanOrEqual": "7.0.23", "status": "affected", "version": "7.0.x", "versionType": "custom" }, { "lessThanOrEqual": "8.0.10", "status": "affected", "version": "8.0.x", "versionType": "custom" } ] } ], "credits": [ { "lang": "en", "value": "L\u00e1szl\u00f3 Gyaraki" } ], "datePublic": "2021-02-08T00:00:00", "descriptions": [ { "lang": "en", "value": "Article Bcc fields and agent personal information are shown when customer prints the ticket (PDF) via external interface. This issue affects: OTRS AG OTRS 7.0.x version 7.0.23 and prior versions; 8.0.x version 8.0.10 and prior versions." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.7, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:N/A:N", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-200", "description": "CWE-200 Information Exposure", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2021-02-08T10:55:19", "orgId": "2e1bf29f-dc29-4ed8-830c-7b9348b6f0e8", "shortName": "OTRS" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "https://otrs.com/release-notes/otrs-security-advisory-2021-02/" } ], "solutions": [ { "lang": "en", "value": "Update to OTRS 8.0.11 or OTRS 7.0.24." } ], "source": { "advisory": "OSA-2021-02", "defect": [ "2020111942002059" ], "discovery": "INTERNAL" }, "title": "Information exposure in PDF export", "x_generator": { "engine": "Vulnogram 0.0.9" }, "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "security@otrs.com", "DATE_PUBLIC": "2021-02-08T00:00:00.000Z", "ID": "CVE-2021-21435", "STATE": "PUBLIC", "TITLE": "Information exposure in PDF export" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "OTRS", "version": { "version_data": [ { "version_affected": "\u003c=", "version_name": "7.0.x", "version_value": "7.0.23" }, { "version_affected": "\u003c=", "version_name": "8.0.x", "version_value": "8.0.10" } ] } } ] }, "vendor_name": "OTRS AG" } ] } }, "credit": [ { "lang": "eng", "value": "L\u00e1szl\u00f3 Gyaraki" } ], "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Article Bcc fields and agent personal information are shown when customer prints the ticket (PDF) via external interface. This issue affects: OTRS AG OTRS 7.0.x version 7.0.23 and prior versions; 8.0.x version 8.0.10 and prior versions." } ] }, "generator": { "engine": "Vulnogram 0.0.9" }, "impact": { "cvss": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.7, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:N/A:N", "version": "3.1" } }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "CWE-200 Information Exposure" } ] } ] }, "references": { "reference_data": [ { "name": "https://otrs.com/release-notes/otrs-security-advisory-2021-02/", "refsource": "CONFIRM", "url": "https://otrs.com/release-notes/otrs-security-advisory-2021-02/" } ] }, "solution": [ { "lang": "en", "value": "Update to OTRS 8.0.11 or OTRS 7.0.24." } ], "source": { "advisory": "OSA-2021-02", "defect": [ "2020111942002059" ], "discovery": "INTERNAL" } } } }, "cveMetadata": { "assignerOrgId": "2e1bf29f-dc29-4ed8-830c-7b9348b6f0e8", "assignerShortName": "OTRS", "cveId": "CVE-2021-21435", "datePublished": "2021-02-08T10:55:19.651769Z", "dateReserved": "2020-12-29T00:00:00", "dateUpdated": "2024-09-16T22:35:33.885Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2020-1767
Vulnerability from cvelistv5
Published
2020-01-10 15:09
Modified
2024-09-16 16:33
Severity ?
EPSS score ?
Summary
Agent A is able to save a draft (i.e. for customer reply). Then Agent B can open the draft, change the text completely and send it in the name of Agent A. For the customer it will not be visible that the message was sent by another agent. This issue affects: ((OTRS)) Community Edition 6.0.x version 6.0.24 and prior versions. OTRS 7.0.x version 7.0.13 and prior versions.
References
Impacted products
Vendor | Product | Version | |||||
---|---|---|---|---|---|---|---|
▼ | OTRS AG | ((OTRS)) Community Edition |
Version: 6.0.x version 6.0.24 and prior versions |
||||
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T06:46:30.861Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://otrs.com/release-notes/otrs-security-advisory-2020-03/" }, { "name": "[debian-lts-announce] 20200129 [SECURITY] [DLA 2079-1] otrs2 security update", "tags": [ "mailing-list", "x_transferred" ], "url": "https://lists.debian.org/debian-lts-announce/2020/01/msg00027.html" }, { "name": "[debian-lts-announce] 20230831 [SECURITY] [DLA 3551-1] otrs2 security update", "tags": [ "mailing-list", "x_transferred" ], "url": "https://lists.debian.org/debian-lts-announce/2023/08/msg00040.html" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "((OTRS)) Community Edition", "vendor": "OTRS AG", "versions": [ { "status": "affected", "version": "6.0.x version 6.0.24 and prior versions" } ] }, { "product": "OTRS", "vendor": "OTRS AG", "versions": [ { "status": "affected", "version": "7.0.x version 7.0.13 and prior versions" } ] } ], "datePublic": "2020-01-10T00:00:00", "descriptions": [ { "lang": "en", "value": "Agent A is able to save a draft (i.e. for customer reply). Then Agent B can open the draft, change the text completely and send it in the name of Agent A. For the customer it will not be visible that the message was sent by another agent. This issue affects: ((OTRS)) Community Edition 6.0.x version 6.0.24 and prior versions. OTRS 7.0.x version 7.0.13 and prior versions." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 3.5, "baseSeverity": "LOW", "confidentialityImpact": "NONE", "integrityImpact": "LOW", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:L/A:N", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "description": "Sender spoofing", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2023-08-31T02:07:04.665672", "orgId": "2e1bf29f-dc29-4ed8-830c-7b9348b6f0e8", "shortName": "OTRS" }, "references": [ { "url": "https://otrs.com/release-notes/otrs-security-advisory-2020-03/" }, { "name": "[debian-lts-announce] 20200129 [SECURITY] [DLA 2079-1] otrs2 security update", "tags": [ "mailing-list" ], "url": "https://lists.debian.org/debian-lts-announce/2020/01/msg00027.html" }, { "name": "[debian-lts-announce] 20230831 [SECURITY] [DLA 3551-1] otrs2 security update", "tags": [ "mailing-list" ], "url": "https://lists.debian.org/debian-lts-announce/2023/08/msg00040.html" } ], "solutions": [ { "lang": "en", "value": "Upgrade to OTRS 7.0.14, ((OTRS)) Community Edition 6.0.25" }, { "lang": "en", "value": "Patch for ((OTRS)) Community Edition 6: https://github.com/OTRS/otrs/commit/5f488fd6c809064ee49def3a432030258d211570" } ], "source": { "advisory": "OSA-2020-03", "defect": [ "2019121042000738" ], "discovery": "USER" }, "title": "Possible to send drafted messages as wrong agent", "x_generator": { "engine": "Vulnogram 0.0.9" } } }, "cveMetadata": { "assignerOrgId": "2e1bf29f-dc29-4ed8-830c-7b9348b6f0e8", "assignerShortName": "OTRS", "cveId": "CVE-2020-1767", "datePublished": "2020-01-10T15:09:00.608111Z", "dateReserved": "2019-11-29T00:00:00", "dateUpdated": "2024-09-16T16:33:51.552Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2021-36096
Vulnerability from cvelistv5
Published
2021-09-06 14:50
Modified
2024-09-16 18:34
Severity ?
EPSS score ?
Summary
Generated Support Bundles contains private S/MIME and PGP keys if containing folder is not hidden. This issue affects: OTRS AG ((OTRS)) Community Edition 6.0.x version 6.0.1 and later versions. OTRS AG OTRS 7.0.x version 7.0.28 and prior versions; 8.0.x version 8.0.15 and prior versions.
References
▼ | URL | Tags |
---|---|---|
https://otrs.com/release-notes/otrs-security-advisory-2021-10/ | x_refsource_CONFIRM |
Impacted products
Vendor | Product | Version | |||||
---|---|---|---|---|---|---|---|
▼ | OTRS AG | ((OTRS)) Community Edition |
Version: 6.0.1 < 6.0.x* |
||||
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T00:47:43.808Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://otrs.com/release-notes/otrs-security-advisory-2021-10/" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "((OTRS)) Community Edition", "vendor": "OTRS AG", "versions": [ { "lessThan": "6.0.x*", "status": "affected", "version": "6.0.1", "versionType": "custom" } ] }, { "product": "OTRS", "vendor": "OTRS AG", "versions": [ { "lessThanOrEqual": "7.0.28", "status": "affected", "version": "7.0.x", "versionType": "custom" }, { "lessThanOrEqual": "8.0.15", "status": "affected", "version": "8.0.x", "versionType": "custom" } ] } ], "credits": [ { "lang": "en", "value": "Matthias Terlinde" } ], "datePublic": "2021-09-06T00:00:00", "descriptions": [ { "lang": "en", "value": "Generated Support Bundles contains private S/MIME and PGP keys if containing folder is not hidden. This issue affects: OTRS AG ((OTRS)) Community Edition 6.0.x version 6.0.1 and later versions. OTRS AG OTRS 7.0.x version 7.0.28 and prior versions; 8.0.x version 8.0.15 and prior versions." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.2, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "LOW", "privilegesRequired": "HIGH", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:U/C:H/I:L/A:N", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-200", "description": "CWE-200 Information Exposure", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2021-09-06T14:50:11", "orgId": "2e1bf29f-dc29-4ed8-830c-7b9348b6f0e8", "shortName": "OTRS" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "https://otrs.com/release-notes/otrs-security-advisory-2021-10/" } ], "solutions": [ { "lang": "en", "value": "Update to OTRS 8.0.16 or OTRS 7.0.29." } ], "source": { "advisory": "OSA-2021-10", "defect": [ "2021050342000331", "2021072642001436" ], "discovery": "USER" }, "title": "Support Bundle includes S/Mime and PGP secret or PIN", "x_generator": { "engine": "Vulnogram 0.0.9" }, "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "security@otrs.com", "DATE_PUBLIC": "2021-09-06T00:00:00.000Z", "ID": "CVE-2021-36096", "STATE": "PUBLIC", "TITLE": "Support Bundle includes S/Mime and PGP secret or PIN" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "((OTRS)) Community Edition", "version": { "version_data": [ { "version_affected": "\u003e=", "version_name": "6.0.x", "version_value": "6.0.1" } ] } }, { "product_name": "OTRS", "version": { "version_data": [ { "version_affected": "\u003c=", "version_name": "7.0.x", "version_value": "7.0.28" }, { "version_affected": "\u003c=", "version_name": "8.0.x", "version_value": "8.0.15" } ] } } ] }, "vendor_name": "OTRS AG" } ] } }, "credit": [ { "lang": "eng", "value": "Matthias Terlinde" } ], "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Generated Support Bundles contains private S/MIME and PGP keys if containing folder is not hidden. This issue affects: OTRS AG ((OTRS)) Community Edition 6.0.x version 6.0.1 and later versions. OTRS AG OTRS 7.0.x version 7.0.28 and prior versions; 8.0.x version 8.0.15 and prior versions." } ] }, "generator": { "engine": "Vulnogram 0.0.9" }, "impact": { "cvss": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.2, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "LOW", "privilegesRequired": "HIGH", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:U/C:H/I:L/A:N", "version": "3.1" } }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "CWE-200 Information Exposure" } ] } ] }, "references": { "reference_data": [ { "name": "https://otrs.com/release-notes/otrs-security-advisory-2021-10/", "refsource": "CONFIRM", "url": "https://otrs.com/release-notes/otrs-security-advisory-2021-10/" } ] }, "solution": [ { "lang": "en", "value": "Update to OTRS 8.0.16 or OTRS 7.0.29." } ], "source": { "advisory": "OSA-2021-10", "defect": [ "2021050342000331", "2021072642001436" ], "discovery": "USER" } } } }, "cveMetadata": { "assignerOrgId": "2e1bf29f-dc29-4ed8-830c-7b9348b6f0e8", "assignerShortName": "OTRS", "cveId": "CVE-2021-36096", "datePublished": "2021-09-06T14:50:11.706653Z", "dateReserved": "2021-07-01T00:00:00", "dateUpdated": "2024-09-16T18:34:20.846Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2020-1770
Vulnerability from cvelistv5
Published
2020-03-27 12:47
Modified
2024-09-17 01:11
Severity ?
EPSS score ?
Summary
Support bundle generated files could contain sensitive information that might be unwanted to be disclosed. This issue affects: ((OTRS)) Community Edition: 5.0.41 and prior versions, 6.0.26 and prior versions. OTRS: 7.0.15 and prior versions.
References
Impacted products
Vendor | Product | Version | |||||
---|---|---|---|---|---|---|---|
▼ | OTRS AG | ((OTRS)) Community Edition |
Version: 5.0.x < Version: 6.0.x < |
||||
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T06:46:30.907Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://otrs.com/release-notes/otrs-security-advisory-2020-07/" }, { "name": "openSUSE-SU-2020:0551", "tags": [ "vendor-advisory", "x_transferred" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2020-04/msg00038.html" }, { "name": "[debian-lts-announce] 20200501 [SECURITY] [DLA 2198-1] otrs2 security update", "tags": [ "mailing-list", "x_transferred" ], "url": "https://lists.debian.org/debian-lts-announce/2020/05/msg00000.html" }, { "name": "openSUSE-SU-2020:1475", "tags": [ "vendor-advisory", "x_transferred" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00066.html" }, { "name": "openSUSE-SU-2020:1509", "tags": [ "vendor-advisory", "x_transferred" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00077.html" }, { "name": "[debian-lts-announce] 20230831 [SECURITY] [DLA 3551-1] otrs2 security update", "tags": [ "mailing-list", "x_transferred" ], "url": "https://lists.debian.org/debian-lts-announce/2023/08/msg00040.html" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "((OTRS)) Community Edition", "vendor": "OTRS AG", "versions": [ { "lessThanOrEqual": "5.0.41", "status": "affected", "version": "5.0.x", "versionType": "custom" }, { "lessThanOrEqual": "6.0.26", "status": "affected", "version": "6.0.x", "versionType": "custom" } ] }, { "product": "OTRS", "vendor": "OTRS AG", "versions": [ { "lessThanOrEqual": "7.0.15", "status": "affected", "version": "7.0.x", "versionType": "custom" } ] } ], "credits": [ { "lang": "en", "value": "Matthias Terlinde" } ], "datePublic": "2020-03-27T00:00:00", "descriptions": [ { "lang": "en", "value": "Support bundle generated files could contain sensitive information that might be unwanted to be disclosed. This issue affects: ((OTRS)) Community Edition: 5.0.41 and prior versions, 6.0.26 and prior versions. OTRS: 7.0.15 and prior versions." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 2.4, "baseSeverity": "LOW", "confidentialityImpact": "LOW", "integrityImpact": "NONE", "privilegesRequired": "HIGH", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:U/C:L/I:N/A:N", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-201", "description": "CWE-201 Information Exposure Through Sent Data", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2023-08-31T02:06:22.490248", "orgId": "2e1bf29f-dc29-4ed8-830c-7b9348b6f0e8", "shortName": "OTRS" }, "references": [ { "url": "https://otrs.com/release-notes/otrs-security-advisory-2020-07/" }, { "name": "openSUSE-SU-2020:0551", "tags": [ "vendor-advisory" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2020-04/msg00038.html" }, { "name": "[debian-lts-announce] 20200501 [SECURITY] [DLA 2198-1] otrs2 security update", "tags": [ "mailing-list" ], "url": "https://lists.debian.org/debian-lts-announce/2020/05/msg00000.html" }, { "name": "openSUSE-SU-2020:1475", "tags": [ "vendor-advisory" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00066.html" }, { "name": "openSUSE-SU-2020:1509", "tags": [ "vendor-advisory" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00077.html" }, { "name": "[debian-lts-announce] 20230831 [SECURITY] [DLA 3551-1] otrs2 security update", "tags": [ "mailing-list" ], "url": "https://lists.debian.org/debian-lts-announce/2023/08/msg00040.html" } ], "solutions": [ { "lang": "en", "value": "Upgrade to OTRS 7.0.16, ((OTRS)) Community Edition 6.0.27, ((OTRS)) Community Edition 5.0.42.\n\nPatch for ((OTRS)) Community Edition 6: https://github.com/OTRS/otrs/commit/cb6d12a74fbf721ba33f24ce93ae37ed9a945a95\nPatch for ((OTRS)) Community Edition 5: https://github.com/OTRS/otrs/commit/d37defe6592992e886cc5cc8fec444d34875fd4d" } ], "source": { "advisory": "OSA-2020-07", "defect": [ "2020021442001997" ], "discovery": "USER" }, "title": "Information disclosure in support bundle files", "x_generator": { "engine": "Vulnogram 0.0.9" } } }, "cveMetadata": { "assignerOrgId": "2e1bf29f-dc29-4ed8-830c-7b9348b6f0e8", "assignerShortName": "OTRS", "cveId": "CVE-2020-1770", "datePublished": "2020-03-27T12:47:49.421305Z", "dateReserved": "2019-11-29T00:00:00", "dateUpdated": "2024-09-17T01:11:13.158Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2021-21438
Vulnerability from cvelistv5
Published
2021-03-22 08:50
Modified
2024-09-17 01:46
Severity ?
EPSS score ?
Summary
Agents are able to see linked FAQ articles without permissions (defined in FAQ Category). This issue affects: FAQ version 6.0.29 and prior versions, OTRS version 7.0.24 and prior versions.
References
▼ | URL | Tags |
---|---|---|
https://otrs.com/release-notes/otrs-security-advisory-2021-08/ | x_refsource_MISC |
Impacted products
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T18:16:22.278Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://otrs.com/release-notes/otrs-security-advisory-2021-08/" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "FAQ", "vendor": "OTRS AG", "versions": [ { "lessThanOrEqual": "6.0.29", "status": "affected", "version": "6.0.x", "versionType": "custom" } ] }, { "product": "OTRS", "vendor": "OTRS AG", "versions": [ { "lessThanOrEqual": "7.0.24", "status": "affected", "version": "unspecified", "versionType": "custom" } ] } ], "credits": [ { "lang": "en", "value": "Christopher Theuerkauf" } ], "datePublic": "2021-03-22T00:00:00", "descriptions": [ { "lang": "en", "value": "Agents are able to see linked FAQ articles without permissions (defined in FAQ Category). This issue affects: FAQ version 6.0.29 and prior versions, OTRS version 7.0.24 and prior versions." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 3.5, "baseSeverity": "LOW", "confidentialityImpact": "LOW", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:L/I:N/A:N", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-264", "description": "CWE-264 Permissions, Privileges, and Access Controls", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2021-03-22T08:50:17", "orgId": "2e1bf29f-dc29-4ed8-830c-7b9348b6f0e8", "shortName": "OTRS" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://otrs.com/release-notes/otrs-security-advisory-2021-08/" } ], "solutions": [ { "lang": "en", "value": "Update to OTRS 7.0.25." } ], "source": { "advisory": "OSA-2021-08", "defect": [ "2021020842001809" ], "discovery": "USER" }, "title": "FAQ articles are shown to users without permission", "x_generator": { "engine": "Vulnogram 0.0.9" }, "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "security@otrs.com", "DATE_PUBLIC": "2021-03-22T00:00:00.000Z", "ID": "CVE-2021-21438", "STATE": "PUBLIC", "TITLE": "FAQ articles are shown to users without permission" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "FAQ", "version": { "version_data": [ { "version_affected": "\u003c=", "version_name": "6.0.x", "version_value": "6.0.29" } ] } }, { "product_name": "OTRS", "version": { "version_data": [ { "version_affected": "\u003c=", "version_value": "7.0.24" } ] } } ] }, "vendor_name": "OTRS AG" } ] } }, "credit": [ { "lang": "eng", "value": "Christopher Theuerkauf" } ], "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Agents are able to see linked FAQ articles without permissions (defined in FAQ Category). This issue affects: FAQ version 6.0.29 and prior versions, OTRS version 7.0.24 and prior versions." } ] }, "generator": { "engine": "Vulnogram 0.0.9" }, "impact": { "cvss": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 3.5, "baseSeverity": "LOW", "confidentialityImpact": "LOW", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:L/I:N/A:N", "version": "3.1" } }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "CWE-264 Permissions, Privileges, and Access Controls" } ] } ] }, "references": { "reference_data": [ { "name": "https://otrs.com/release-notes/otrs-security-advisory-2021-08/", "refsource": "MISC", "url": "https://otrs.com/release-notes/otrs-security-advisory-2021-08/" } ] }, "solution": [ { "lang": "en", "value": "Update to OTRS 7.0.25." } ], "source": { "advisory": "OSA-2021-08", "defect": [ "2021020842001809" ], "discovery": "USER" } } } }, "cveMetadata": { "assignerOrgId": "2e1bf29f-dc29-4ed8-830c-7b9348b6f0e8", "assignerShortName": "OTRS", "cveId": "CVE-2021-21438", "datePublished": "2021-03-22T08:50:17.683469Z", "dateReserved": "2020-12-29T00:00:00", "dateUpdated": "2024-09-17T01:46:15.159Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2022-39051
Vulnerability from cvelistv5
Published
2022-09-05 06:40
Modified
2024-09-16 17:18
Severity ?
EPSS score ?
Summary
Attacker might be able to execute malicious Perl code in the Template toolkit, by having the admin installing an unverified 3th party package
References
▼ | URL | Tags |
---|---|---|
https://otrs.com/release-notes/otrs-security-advisory-2022-12/ | x_refsource_CONFIRM |
Impacted products
Vendor | Product | Version | |||||
---|---|---|---|---|---|---|---|
▼ | OTRS AG | OTRS |
Version: 7.0.x 7.0.36 Version: 8.0.x 8.0.24 |
||||
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T11:10:32.406Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://otrs.com/release-notes/otrs-security-advisory-2022-12/" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "OTRS", "vendor": "OTRS AG", "versions": [ { "status": "affected", "version": "7.0.x 7.0.36" }, { "status": "affected", "version": "8.0.x 8.0.24" } ] }, { "product": "((OTRS)) Community Edition", "vendor": "OTRS AG", "versions": [ { "lessThan": "6.0.x*", "status": "affected", "version": "6.0.1", "versionType": "custom" } ] } ], "datePublic": "2022-09-05T00:00:00", "descriptions": [ { "lang": "en", "value": "Attacker might be able to execute malicious Perl code in the Template toolkit, by having the admin installing an unverified 3th party package" } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 6.8, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "HIGH", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-913", "description": "CWE-913 Improper Control of Dynamically-Managed Code Resources", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2022-09-05T06:40:12", "orgId": "2e1bf29f-dc29-4ed8-830c-7b9348b6f0e8", "shortName": "OTRS" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "https://otrs.com/release-notes/otrs-security-advisory-2022-12/" } ], "solutions": [ { "lang": "en", "value": "Update to OTRS 8.0.25 or OTRS 7.0.37." } ], "source": { "advisory": "OSA-2022-12", "defect": [ "2022042942000784" ], "discovery": "USER" }, "title": "Perl Code execution in Template Toolkit", "x_generator": { "engine": "Vulnogram 0.0.9" }, "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "security@otrs.com", "DATE_PUBLIC": "2022-09-05T07:00:00.000Z", "ID": "CVE-2022-39051", "STATE": "PUBLIC", "TITLE": "Perl Code execution in Template Toolkit" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "OTRS", "version": { "version_data": [ { "version_name": "7.0.x", "version_value": "7.0.36" }, { "version_name": "8.0.x", "version_value": "8.0.24" } ] } }, { "product_name": "((OTRS)) Community Edition", "version": { "version_data": [ { "version_affected": "\u003e=", "version_name": "6.0.x", "version_value": "6.0.1" } ] } } ] }, "vendor_name": "OTRS AG" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Attacker might be able to execute malicious Perl code in the Template toolkit, by having the admin installing an unverified 3th party package" } ] }, "generator": { "engine": "Vulnogram 0.0.9" }, "impact": { "cvss": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 6.8, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "HIGH", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" } }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "CWE-913 Improper Control of Dynamically-Managed Code Resources" } ] } ] }, "references": { "reference_data": [ { "name": "https://otrs.com/release-notes/otrs-security-advisory-2022-12/", "refsource": "CONFIRM", "url": "https://otrs.com/release-notes/otrs-security-advisory-2022-12/" } ] }, "solution": [ { "lang": "en", "value": "Update to OTRS 8.0.25 or OTRS 7.0.37." } ], "source": { "advisory": "OSA-2022-12", "defect": [ "2022042942000784" ], "discovery": "USER" } } } }, "cveMetadata": { "assignerOrgId": "2e1bf29f-dc29-4ed8-830c-7b9348b6f0e8", "assignerShortName": "OTRS", "cveId": "CVE-2022-39051", "datePublished": "2022-09-05T06:40:12.771350Z", "dateReserved": "2022-08-31T00:00:00", "dateUpdated": "2024-09-16T17:18:42.122Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2021-36097
Vulnerability from cvelistv5
Published
2021-10-18 07:00
Modified
2024-09-16 22:51
Severity ?
EPSS score ?
Summary
Agents are able to lock the ticket without the "Owner" permission. Once the ticket is locked, it could be moved to the queue where the agent has "rw" permissions and gain a full control. This issue affects: OTRS AG OTRS 8.0.x version: 8.0.16 and prior versions.
References
▼ | URL | Tags |
---|---|---|
https://otrs.com/release-notes/otrs-security-advisory-2021-20/ | x_refsource_CONFIRM |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T00:47:43.825Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://otrs.com/release-notes/otrs-security-advisory-2021-20/" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "OTRS", "vendor": "OTRS AG", "versions": [ { "lessThanOrEqual": "8.0.16", "status": "affected", "version": "8.0.x", "versionType": "custom" } ] } ], "datePublic": "2021-10-18T00:00:00", "descriptions": [ { "lang": "en", "value": "Agents are able to lock the ticket without the \"Owner\" permission. Once the ticket is locked, it could be moved to the queue where the agent has \"rw\" permissions and gain a full control. This issue affects: OTRS AG OTRS 8.0.x version: 8.0.16 and prior versions." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 3.5, "baseSeverity": "LOW", "confidentialityImpact": "NONE", "integrityImpact": "LOW", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:L/A:N", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-266", "description": "CWE-266 Incorrect Privilege Assignment", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2021-10-18T07:00:13", "orgId": "2e1bf29f-dc29-4ed8-830c-7b9348b6f0e8", "shortName": "OTRS" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "https://otrs.com/release-notes/otrs-security-advisory-2021-20/" } ], "solutions": [ { "lang": "en", "value": "Update to OTRS 8.0.17." } ], "source": { "advisory": "OSA-2021-20", "defect": [ "2021083142001442" ], "discovery": "USER" }, "title": "Agents are able to lock the ticket without the \"Owner\" permission", "x_generator": { "engine": "Vulnogram 0.0.9" }, "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "security@otrs.com", "DATE_PUBLIC": "2021-10-18T00:00:00.000Z", "ID": "CVE-2021-36097", "STATE": "PUBLIC", "TITLE": "Agents are able to lock the ticket without the \"Owner\" permission" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "OTRS", "version": { "version_data": [ { "version_affected": "\u003c=", "version_name": "8.0.x", "version_value": "8.0.16" } ] } } ] }, "vendor_name": "OTRS AG" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Agents are able to lock the ticket without the \"Owner\" permission. Once the ticket is locked, it could be moved to the queue where the agent has \"rw\" permissions and gain a full control. This issue affects: OTRS AG OTRS 8.0.x version: 8.0.16 and prior versions." } ] }, "generator": { "engine": "Vulnogram 0.0.9" }, "impact": { "cvss": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 3.5, "baseSeverity": "LOW", "confidentialityImpact": "NONE", "integrityImpact": "LOW", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:L/A:N", "version": "3.1" } }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "CWE-266 Incorrect Privilege Assignment" } ] } ] }, "references": { "reference_data": [ { "name": "https://otrs.com/release-notes/otrs-security-advisory-2021-20/", "refsource": "CONFIRM", "url": "https://otrs.com/release-notes/otrs-security-advisory-2021-20/" } ] }, "solution": [ { "lang": "en", "value": "Update to OTRS 8.0.17." } ], "source": { "advisory": "OSA-2021-20", "defect": [ "2021083142001442" ], "discovery": "USER" } } } }, "cveMetadata": { "assignerOrgId": "2e1bf29f-dc29-4ed8-830c-7b9348b6f0e8", "assignerShortName": "OTRS", "cveId": "CVE-2021-36097", "datePublished": "2021-10-18T07:00:13.855031Z", "dateReserved": "2021-07-01T00:00:00", "dateUpdated": "2024-09-16T22:51:23.138Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2022-32741
Vulnerability from cvelistv5
Published
2022-06-13 08:01
Modified
2024-09-16 16:43
Severity ?
EPSS score ?
Summary
Attacker is able to determine if the provided username exists (and it's valid) using Request New Password feature, based on the response time.
References
▼ | URL | Tags |
---|---|---|
https://otrs.com/release-notes/otrs-security-advisory-2022-09/ | x_refsource_CONFIRM |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T07:46:44.955Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://otrs.com/release-notes/otrs-security-advisory-2022-09/" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "OTRS", "vendor": "OTRS AG", "versions": [ { "lessThanOrEqual": "7.0.34", "status": "affected", "version": "7.0.x", "versionType": "custom" }, { "lessThanOrEqual": "8.0.22", "status": "affected", "version": "8.0.x", "versionType": "custom" } ] } ], "credits": [ { "lang": "en", "value": "Special thanks to Bal\u00e1zs \u00dar for reporting these vulnerability." } ], "datePublic": "2022-06-13T00:00:00", "descriptions": [ { "lang": "en", "value": "Attacker is able to determine if the provided username exists (and it\u0027s valid) using Request New Password feature, based on the response time." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-200", "description": "CWE-200 Information Exposure", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2022-06-13T08:01:04", "orgId": "2e1bf29f-dc29-4ed8-830c-7b9348b6f0e8", "shortName": "OTRS" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "https://otrs.com/release-notes/otrs-security-advisory-2022-09/" } ], "solutions": [ { "lang": "en", "value": "Update to OTRS 8.0.23 or OTRS 7.0.35." } ], "source": { "advisory": "OSA-2022-09", "defect": [ "2022031842001181" ], "discovery": "INTERNAL" }, "title": "Information disclosure in Request New Password feature", "x_generator": { "engine": "Vulnogram 0.0.9" }, "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "security@otrs.com", "DATE_PUBLIC": "2022-06-13T07:00:00.000Z", "ID": "CVE-2022-32741", "STATE": "PUBLIC", "TITLE": "Information disclosure in Request New Password feature" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "OTRS", "version": { "version_data": [ { "version_affected": "\u003c=", "version_name": "7.0.x", "version_value": "7.0.34" }, { "version_affected": "\u003c=", "version_name": "8.0.x", "version_value": "8.0.22" } ] } } ] }, "vendor_name": "OTRS AG" } ] } }, "credit": [ { "lang": "eng", "value": "Special thanks to Bal\u00e1zs \u00dar for reporting these vulnerability." } ], "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Attacker is able to determine if the provided username exists (and it\u0027s valid) using Request New Password feature, based on the response time." } ] }, "generator": { "engine": "Vulnogram 0.0.9" }, "impact": { "cvss": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N", "version": "3.1" } }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "CWE-200 Information Exposure" } ] } ] }, "references": { "reference_data": [ { "name": "https://otrs.com/release-notes/otrs-security-advisory-2022-09/", "refsource": "CONFIRM", "url": "https://otrs.com/release-notes/otrs-security-advisory-2022-09/" } ] }, "solution": [ { "lang": "en", "value": "Update to OTRS 8.0.23 or OTRS 7.0.35." } ], "source": { "advisory": "OSA-2022-09", "defect": [ "2022031842001181" ], "discovery": "INTERNAL" } } } }, "cveMetadata": { "assignerOrgId": "2e1bf29f-dc29-4ed8-830c-7b9348b6f0e8", "assignerShortName": "OTRS", "cveId": "CVE-2022-32741", "datePublished": "2022-06-13T08:01:04.282221Z", "dateReserved": "2022-06-09T00:00:00", "dateUpdated": "2024-09-16T16:43:46.120Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2024-43443
Vulnerability from cvelistv5
Published
2024-08-26 08:42
Modified
2024-08-26 14:55
Severity ?
EPSS score ?
Summary
Improper Neutralization of Input done by an attacker with admin privileges ('Cross-site Scripting') in Process Management modules of OTRS and ((OTRS)) Community Edition allows Cross-Site Scripting (XSS) within the Process Management targeting other admins.
This issue affects:
* OTRS from 7.0.X through 7.0.50
* OTRS 8.0.X
* OTRS 2023.X
* OTRS from 2024.X through 2024.5.X
* ((OTRS)) Community Edition: 6.0.x
Products based on the ((OTRS)) Community Edition also very likely to be affected
References
Impacted products
Vendor | Product | Version | |||||
---|---|---|---|---|---|---|---|
▼ | OTRS AG | OTRS |
Version: 7.0.x Version: 8.0.x Version: 2023.x Version: 2024.x |
||||
|
{ "containers": { "adp": [ { "metrics": [ { "other": { "content": { "id": "CVE-2024-43443", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-08-26T14:55:41.494333Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-08-26T14:55:57.618Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "modules": [ "Process Management" ], "product": "OTRS", "vendor": "OTRS AG", "versions": [ { "lessThanOrEqual": "7.0.50", "status": "affected", "version": "7.0.x", "versionType": "Patch" }, { "status": "affected", "version": "8.0.x" }, { "status": "affected", "version": "2023.x" }, { "lessThanOrEqual": "2024.5.x", "status": "affected", "version": "2024.x", "versionType": "Patch" } ] }, { "defaultStatus": "affected", "modules": [ "Process Management" ], "product": "((OTRS)) Community Edition", "vendor": "OTRS AG", "versions": [ { "status": "affected", "version": "6.0.x" } ] } ], "credits": [ { "lang": "en", "type": "reporter", "value": "Special thanks to Marek Holka for reporting these vulnerability." } ], "datePublic": "2024-08-26T08:00:00.000Z", "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "Improper Neutralization of Input done by an attacker with admin privileges (\u0027Cross-site Scripting\u0027) in Process Management modules of OTRS and ((OTRS)) Community Edition allows Cross-Site Scripting (XSS) within the Process Management targeting other admins.\u003cbr\u003e\u003cp\u003eThis issue affects: \u003c/p\u003e\u003cul\u003e\u003cli\u003eOTRS from 7.0.X through 7.0.50\u003c/li\u003e\u003cli\u003eOTRS 8.0.X\u003c/li\u003e\u003cli\u003eOTRS 2023.X\u003c/li\u003e\u003cli\u003eOTRS from 2024.X through 2024.5.X\u003c/li\u003e\u003cli\u003e((OTRS)) Community Edition: 6.0.x\u003cbr\u003e\u003c/li\u003e\u003c/ul\u003e\u003cdiv\u003eProducts based on the ((OTRS)) Community Edition also very likely to be affected\u003c/div\u003e\u003cbr\u003e" } ], "value": "Improper Neutralization of Input done by an attacker with admin privileges (\u0027Cross-site Scripting\u0027) in Process Management modules of OTRS and ((OTRS)) Community Edition allows Cross-Site Scripting (XSS) within the Process Management targeting other admins.\nThis issue affects: \n\n * OTRS from 7.0.X through 7.0.50\n * OTRS 8.0.X\n * OTRS 2023.X\n * OTRS from 2024.X through 2024.5.X\n * ((OTRS)) Community Edition: 6.0.x\n\nProducts based on the ((OTRS)) Community Edition also very likely to be affected" } ], "impacts": [ { "capecId": "CAPEC-63", "descriptions": [ { "lang": "en", "value": "CAPEC-63 Cross-Site Scripting (XSS)" } ] } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 4.9, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "HIGH", "privilegesRequired": "HIGH", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:H/A:N", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-790", "description": "CWE-790 Improper Filtering of Special Elements", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-08-26T08:42:55.095Z", "orgId": "2e1bf29f-dc29-4ed8-830c-7b9348b6f0e8", "shortName": "OTRS" }, "references": [ { "url": "https://otrs.com/release-notes/otrs-security-advisory-2024-11/" } ], "solutions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "Update to OTRS 2024.6.x or OTRS 7.0.51\u003cbr\u003e" } ], "value": "Update to OTRS 2024.6.x or OTRS 7.0.51" } ], "source": { "advisory": "OSA-2024-11", "defect": [ "Issue#2592", "Ticket#2024061942000965" ], "discovery": "EXTERNAL" }, "title": "Stored XSS in process management", "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "2e1bf29f-dc29-4ed8-830c-7b9348b6f0e8", "assignerShortName": "OTRS", "cveId": "CVE-2024-43443", "datePublished": "2024-08-26T08:42:55.095Z", "dateReserved": "2024-08-13T13:38:47.972Z", "dateUpdated": "2024-08-26T14:55:57.618Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2022-32740
Vulnerability from cvelistv5
Published
2022-06-13 08:00
Modified
2024-09-16 19:09
Severity ?
EPSS score ?
Summary
A reply to a forwarded email article by a 3rd party could unintensionally expose the email content to the ticket customer under certain circumstances.
References
▼ | URL | Tags |
---|---|---|
https://otrs.com/release-notes/otrs-security-advisory-2022-08/ | x_refsource_CONFIRM |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T07:46:45.262Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://otrs.com/release-notes/otrs-security-advisory-2022-08/" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "OTRS", "vendor": "OTRS AG", "versions": [ { "lessThanOrEqual": "7.0.34", "status": "affected", "version": "7.0.x", "versionType": "custom" }, { "lessThanOrEqual": "8.0.22", "status": "affected", "version": "8.0.x", "versionType": "custom" } ] } ], "credits": [ { "lang": "en", "value": "Special thanks to Oliver Gernetzke and Francesco Barba for reporting these vulnerability." } ], "datePublic": "2022-06-13T00:00:00", "descriptions": [ { "lang": "en", "value": "A reply to a forwarded email article by a 3rd party could unintensionally expose the email content to the ticket customer under certain circumstances." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 3.5, "baseSeverity": "LOW", "confidentialityImpact": "LOW", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:L/I:N/A:N", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-200", "description": "CWE-200 Information Exposure", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2022-06-13T08:00:48", "orgId": "2e1bf29f-dc29-4ed8-830c-7b9348b6f0e8", "shortName": "OTRS" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "https://otrs.com/release-notes/otrs-security-advisory-2022-08/" } ], "solutions": [ { "lang": "en", "value": "Update to OTRS 8.0.23 or OTRS 7.0.35." } ], "source": { "advisory": "OSA-2022-08", "defect": [ "2022010742001151", "2022033142001673" ], "discovery": "USER" }, "title": "Information disclosure in the External Interface", "x_generator": { "engine": "Vulnogram 0.0.9" }, "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "security@otrs.com", "DATE_PUBLIC": "2022-06-13T07:00:00.000Z", "ID": "CVE-2022-32740", "STATE": "PUBLIC", "TITLE": "Information disclosure in the External Interface" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "OTRS", "version": { "version_data": [ { "version_affected": "\u003c=", "version_name": "7.0.x", "version_value": "7.0.34" }, { "version_affected": "\u003c=", "version_name": "8.0.x", "version_value": "8.0.22" } ] } } ] }, "vendor_name": "OTRS AG" } ] } }, "credit": [ { "lang": "eng", "value": "Special thanks to Oliver Gernetzke and Francesco Barba for reporting these vulnerability." } ], "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "A reply to a forwarded email article by a 3rd party could unintensionally expose the email content to the ticket customer under certain circumstances." } ] }, "generator": { "engine": "Vulnogram 0.0.9" }, "impact": { "cvss": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 3.5, "baseSeverity": "LOW", "confidentialityImpact": "LOW", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:L/I:N/A:N", "version": "3.1" } }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "CWE-200 Information Exposure" } ] } ] }, "references": { "reference_data": [ { "name": "https://otrs.com/release-notes/otrs-security-advisory-2022-08/", "refsource": "CONFIRM", "url": "https://otrs.com/release-notes/otrs-security-advisory-2022-08/" } ] }, "solution": [ { "lang": "en", "value": "Update to OTRS 8.0.23 or OTRS 7.0.35." } ], "source": { "advisory": "OSA-2022-08", "defect": [ "2022010742001151", "2022033142001673" ], "discovery": "USER" } } } }, "cveMetadata": { "assignerOrgId": "2e1bf29f-dc29-4ed8-830c-7b9348b6f0e8", "assignerShortName": "OTRS", "cveId": "CVE-2022-32740", "datePublished": "2022-06-13T08:00:48.928529Z", "dateReserved": "2022-06-09T00:00:00", "dateUpdated": "2024-09-16T19:09:59.946Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2023-38056
Vulnerability from cvelistv5
Published
2023-07-24 08:27
Modified
2024-10-23 17:49
Severity ?
EPSS score ?
Summary
Improper Neutralization of commands allowed to be executed via OTRS System Configuration e.g. SchedulerCronTaskModule using UnitTests modules allows any authenticated attacker with admin privileges local execution of Code.This issue affects OTRS: from 7.0.X before 7.0.45, from 8.0.X before 8.0.35; ((OTRS)) Community Edition: from 6.0.1 through 6.0.34.
References
Impacted products
Vendor | Product | Version | |||||
---|---|---|---|---|---|---|---|
▼ | OTRS AG | OTRS |
Version: 7.0.x Version: 8.0.x |
||||
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T17:30:12.960Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://otrs.com/release-notes/otrs-security-advisory-2023-05/" } ], "title": "CVE Program Container" }, { "metrics": [ { "other": { "content": { "id": "CVE-2023-38056", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "total" } ], "role": "CISA Coordinator", "timestamp": "2024-10-23T17:47:42.741098Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-10-23T17:49:19.541Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "affected", "modules": [ "System Configuration", "UnitTests" ], "product": "OTRS", "vendor": "OTRS AG", "versions": [ { "lessThan": "7.0.45", "status": "affected", "version": "7.0.x", "versionType": "Patch" }, { "lessThan": "8.0.35", "status": "affected", "version": "8.0.x", "versionType": "Patch" } ] }, { "defaultStatus": "affected", "product": "((OTRS)) Community Edition", "vendor": "OTRS AG", "versions": [ { "lessThanOrEqual": "6.0.34", "status": "affected", "version": "6.0.1", "versionType": "All" } ] } ], "credits": [ { "lang": "en", "type": "finder", "user": "00000000-0000-4000-9000-000000000000", "value": "Special thanks to Tim P\u00fcttmanns for reporting these vulnerability." } ], "datePublic": "2023-07-24T07:00:00.000Z", "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "Improper Neutralization of commands allowed to be executed via OTRS System Configuration e.g. SchedulerCronTaskModule using UnitTests modules allows any authenticated attacker with admin privileges local execution of Code.\u003cp\u003eThis issue affects OTRS: from 7.0.X before 7.0.45, from 8.0.X before 8.0.35; ((OTRS)) Community Edition: from 6.0.1 through 6.0.34.\u003c/p\u003e" } ], "value": "Improper Neutralization of commands allowed to be executed via OTRS System Configuration e.g. SchedulerCronTaskModule using UnitTests modules allows any authenticated attacker with admin privileges local execution of Code.This issue affects OTRS: from 7.0.X before 7.0.45, from 8.0.X before 8.0.35; ((OTRS)) Community Edition: from 6.0.1 through 6.0.34.\n\n" } ], "impacts": [ { "capecId": "CAPEC-549", "descriptions": [ { "lang": "en", "value": "CAPEC-549 Local Execution of Code" } ] } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.2, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "HIGH", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-78", "description": "CWE-78 Improper Neutralization of Special Elements used in an OS Command (\u0027OS Command Injection\u0027)", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2023-07-24T08:27:26.270Z", "orgId": "2e1bf29f-dc29-4ed8-830c-7b9348b6f0e8", "shortName": "OTRS" }, "references": [ { "url": "https://otrs.com/release-notes/otrs-security-advisory-2023-05/" } ], "solutions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "Update to OTRS 8.0.35 or OTRS 7.0.45\u003cbr\u003e" } ], "value": "Update to OTRS 8.0.35 or OTRS 7.0.45\n" } ], "source": { "advisory": "OSA-2023-05", "defect": [ "1025", "Ticket#2023041142000636" ], "discovery": "EXTERNAL" }, "title": "Code execution via System Configuration ", "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "2e1bf29f-dc29-4ed8-830c-7b9348b6f0e8", "assignerShortName": "OTRS", "cveId": "CVE-2023-38056", "datePublished": "2023-07-24T08:27:13.127Z", "dateReserved": "2023-07-12T08:05:38.780Z", "dateUpdated": "2024-10-23T17:49:19.541Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2020-1775
Vulnerability from cvelistv5
Published
2020-06-08 15:29
Modified
2024-09-16 22:30
Severity ?
EPSS score ?
Summary
BCC recipients in mails sent from OTRS are visible in article detail on external interface. This issue affects OTRS: 8.0.3 and prior versions, 7.0.17 and prior versions.
References
▼ | URL | Tags |
---|---|---|
https://otrs.com/release-notes/otrs-security-advisory-2020-12/ | x_refsource_MISC |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T06:46:30.915Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://otrs.com/release-notes/otrs-security-advisory-2020-12/" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "OTRS", "vendor": "OTRS AG", "versions": [ { "lessThanOrEqual": "7.0.17", "status": "affected", "version": "7.0.x", "versionType": "custom" }, { "lessThanOrEqual": "8.0.3", "status": "affected", "version": "8.0.x", "versionType": "custom" } ] } ], "datePublic": "2020-06-08T00:00:00", "descriptions": [ { "lang": "en", "value": "BCC recipients in mails sent from OTRS are visible in article detail on external interface. This issue affects OTRS: 8.0.3 and prior versions, 7.0.17 and prior versions." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 3.5, "baseSeverity": "LOW", "confidentialityImpact": "LOW", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:L/I:N/A:N", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-200", "description": "CWE-200 Information Exposure", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2020-06-08T15:29:40", "orgId": "2e1bf29f-dc29-4ed8-830c-7b9348b6f0e8", "shortName": "OTRS" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://otrs.com/release-notes/otrs-security-advisory-2020-12/" } ], "solutions": [ { "lang": "en", "value": "Upgrade to OTRS 7.0.18 and OTRS 8.0.4." } ], "source": { "defect": [ "2020050742001441" ], "discovery": "USER" }, "title": "Information disclosure in external interface", "x_generator": { "engine": "Vulnogram 0.0.9" }, "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "security@otrs.com", "DATE_PUBLIC": "2020-06-08T00:00:00.000Z", "ID": "CVE-2020-1775", "STATE": "PUBLIC", "TITLE": "Information disclosure in external interface" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "OTRS", "version": { "version_data": [ { "version_affected": "\u003c=", "version_name": "7.0.x", "version_value": "7.0.17" }, { "version_affected": "\u003c=", "version_name": "8.0.x", "version_value": "8.0.3" } ] } } ] }, "vendor_name": "OTRS AG" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "BCC recipients in mails sent from OTRS are visible in article detail on external interface. This issue affects OTRS: 8.0.3 and prior versions, 7.0.17 and prior versions." } ] }, "generator": { "engine": "Vulnogram 0.0.9" }, "impact": { "cvss": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 3.5, "baseSeverity": "LOW", "confidentialityImpact": "LOW", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:L/I:N/A:N", "version": "3.1" } }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "CWE-200 Information Exposure" } ] } ] }, "references": { "reference_data": [ { "name": "https://otrs.com/release-notes/otrs-security-advisory-2020-12/", "refsource": "MISC", "url": "https://otrs.com/release-notes/otrs-security-advisory-2020-12/" } ] }, "solution": [ { "lang": "en", "value": "Upgrade to OTRS 7.0.18 and OTRS 8.0.4." } ], "source": { "defect": [ "2020050742001441" ], "discovery": "USER" } } } }, "cveMetadata": { "assignerOrgId": "2e1bf29f-dc29-4ed8-830c-7b9348b6f0e8", "assignerShortName": "OTRS", "cveId": "CVE-2020-1775", "datePublished": "2020-06-08T15:29:40.513794Z", "dateReserved": "2019-11-29T00:00:00", "dateUpdated": "2024-09-16T22:30:23.236Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2023-38058
Vulnerability from cvelistv5
Published
2023-07-24 08:28
Modified
2024-10-17 13:03
Severity ?
EPSS score ?
Summary
An improper privilege check in the OTRS ticket move action in the agent interface allows any as agent authenticated attacker to to perform a move of an ticket without the needed permission.
This issue affects OTRS: from 8.0.X before 8.0.35.
References
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T17:30:13.987Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://otrs.com/release-notes/otrs-security-advisory-2023-07/" } ], "title": "CVE Program Container" }, { "metrics": [ { "other": { "content": { "id": "CVE-2023-38058", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-10-17T13:01:36.299740Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-10-17T13:03:11.116Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "affected", "modules": [ "Agent interface" ], "product": "OTRS", "vendor": "OTRS AG", "versions": [ { "lessThan": "8.0.35", "status": "affected", "version": "8.0.x", "versionType": "Patch" } ] } ], "datePublic": "2023-07-24T07:00:00.000Z", "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "An improper privilege check in the OTRS ticket move action in the agent interface allows any as agent authenticated attacker to to perform a move of an ticket without the needed permission.\u003cbr\u003e\u003cp\u003eThis issue affects OTRS: from 8.0.X before 8.0.35.\u003c/p\u003e" } ], "value": "An improper privilege check in the OTRS ticket move action in the agent interface allows any as agent authenticated attacker to to perform a move of an ticket without the needed permission.\nThis issue affects OTRS: from 8.0.X before 8.0.35.\n\n" } ], "impacts": [ { "capecId": "CAPEC-233", "descriptions": [ { "lang": "en", "value": "CAPEC-233 Privilege Escalation" } ] } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 4.1, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "LOW", "privilegesRequired": "LOW", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:N/I:L/A:N", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-269", "description": "CWE-269 Improper Privilege Management", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2023-07-24T08:28:03.242Z", "orgId": "2e1bf29f-dc29-4ed8-830c-7b9348b6f0e8", "shortName": "OTRS" }, "references": [ { "url": "https://otrs.com/release-notes/otrs-security-advisory-2023-07/" } ], "solutions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "Update to OTRS 8.0.35\u003cbr\u003e" } ], "value": "Update to OTRS 8.0.35\n" } ], "source": { "advisory": "OSA-2023-07", "defect": [ "Issue#1023", "Ticket#2022090542001523" ], "discovery": "USER" }, "title": "Tickets can be moved without permissions", "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "2e1bf29f-dc29-4ed8-830c-7b9348b6f0e8", "assignerShortName": "OTRS", "cveId": "CVE-2023-38058", "datePublished": "2023-07-24T08:28:03.242Z", "dateReserved": "2023-07-12T08:05:38.780Z", "dateUpdated": "2024-10-17T13:03:11.116Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2023-5421
Vulnerability from cvelistv5
Published
2023-10-16 08:10
Modified
2024-09-16 16:55
Severity ?
EPSS score ?
Summary
An attacker who is logged into OTRS as an user with privileges to create and change customer user data may manipulate the CustomerID field to execute JavaScript code that runs
immediatly after the data is saved.The issue onlyoccurs if the configuration for AdminCustomerUser::UseAutoComplete was changed before.
This issue affects OTRS: from 7.0.X before 7.0.47, from 8.0.X before 8.0.37; ((OTRS)) Community Edition: from 6.0.X through 6.0.34.
References
Impacted products
Vendor | Product | Version | |||||
---|---|---|---|---|---|---|---|
▼ | OTRS AG | OTRS |
Version: 7.0.x Version: 8.0.x |
||||
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T07:59:44.593Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://otrs.com/release-notes/otrs-security-advisory-2023-09/" } ], "title": "CVE Program Container" }, { "metrics": [ { "other": { "content": { "id": "CVE-2023-5421", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-09-16T16:53:50.683230Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-09-16T16:55:01.099Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "affected", "modules": [ "Agent Interface" ], "product": "OTRS", "vendor": "OTRS AG", "versions": [ { "lessThan": "7.0.47", "status": "affected", "version": "7.0.x", "versionType": "Patch" }, { "lessThan": "8.0.37", "status": "affected", "version": "8.0.x", "versionType": "Patch" } ] }, { "defaultStatus": "affected", "modules": [ "Agent Interface" ], "product": "((OTRS)) Community Edition", "vendor": "OTRS AG", "versions": [ { "lessThanOrEqual": "6.0.34", "status": "affected", "version": "6.0.x", "versionType": "All" } ] } ], "credits": [ { "lang": "en", "type": "finder", "value": "Special thanks to Tim P\u00fcttmanns for reporting these vulnerability." } ], "datePublic": "2023-10-16T07:00:00.000Z", "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "An attacker who is logged into OTRS as an user with privileges to create and change customer user data may manipulate the CustomerID field to execute JavaScript code that runs \nimmediatly after the data is saved.The issue onlyoccurs if the configuration for AdminCustomerUser::UseAutoComplete was changed before.\u003cbr\u003e\u003cp\u003eThis issue affects OTRS: from 7.0.X before 7.0.47, from 8.0.X before 8.0.37; ((OTRS)) Community Edition: from 6.0.X through 6.0.34.\u003c/p\u003e" } ], "value": "An attacker who is logged into OTRS as an user with privileges to create and change customer user data may manipulate the CustomerID field to execute JavaScript code that runs \nimmediatly after the data is saved.The issue onlyoccurs if the configuration for AdminCustomerUser::UseAutoComplete was changed before.\nThis issue affects OTRS: from 7.0.X before 7.0.47, from 8.0.X before 8.0.37; ((OTRS)) Community Edition: from 6.0.X through 6.0.34.\n\n" } ], "impacts": [ { "capecId": "CAPEC-63", "descriptions": [ { "lang": "en", "value": "CAPEC-63 Cross-Site Scripting (XSS)" } ] } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "ADJACENT_NETWORK", "availabilityImpact": "NONE", "baseScore": 3.5, "baseSeverity": "LOW", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "HIGH", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:A/AC:L/PR:H/UI:N/S:U/C:L/I:L/A:N", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-20", "description": "CWE-20 Improper Input Validation", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2023-10-16T08:10:55.114Z", "orgId": "2e1bf29f-dc29-4ed8-830c-7b9348b6f0e8", "shortName": "OTRS" }, "references": [ { "url": "https://otrs.com/release-notes/otrs-security-advisory-2023-09/" } ], "solutions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "\nUpdate to OTRS 7.0.47 or OTRS 8.0.37.\n\u003cbr\u003e" } ], "value": "Update to OTRS 7.0.47 or OTRS 8.0.37.\n\n" } ], "source": { "advisory": "OSA-2023-09", "defect": [ "Issue#1214", "Ticket#2023080742002233" ], "discovery": "EXTERNAL" }, "title": " Possible XSS execution in customer information ", "workarounds": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "Switch AdminCustomerUser::UseAutoComplete off\u003cbr\u003e" } ], "value": "Switch AdminCustomerUser::UseAutoComplete off\n" } ], "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "2e1bf29f-dc29-4ed8-830c-7b9348b6f0e8", "assignerShortName": "OTRS", "cveId": "CVE-2023-5421", "datePublished": "2023-10-16T08:10:55.114Z", "dateReserved": "2023-10-05T08:12:09.849Z", "dateUpdated": "2024-09-16T16:55:01.099Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2022-1004
Vulnerability from cvelistv5
Published
2022-03-21 09:15
Modified
2024-09-17 02:32
Severity ?
EPSS score ?
Summary
Accounted time is shown in the Ticket Detail View (External Interface), even if ExternalFrontend::TicketDetailView###AccountedTimeDisplay is disabled.
References
▼ | URL | Tags |
---|---|---|
https://otrs.com/release-notes/otrs-security-advisory-2022-06/ | x_refsource_CONFIRM |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T23:47:43.287Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://otrs.com/release-notes/otrs-security-advisory-2022-06/" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "OTRS", "vendor": "OTRS AG", "versions": [ { "lessThanOrEqual": "7.0.32", "status": "affected", "version": "7.0.x", "versionType": "custom" }, { "lessThanOrEqual": "8.0.19", "status": "affected", "version": "8.0.x", "versionType": "custom" } ] } ], "credits": [ { "lang": "en", "value": "Special thanks to Jasmin Hammes for reporting these vulnerability." } ], "datePublic": "2022-03-21T00:00:00", "descriptions": [ { "lang": "en", "value": "Accounted time is shown in the Ticket Detail View (External Interface), even if ExternalFrontend::TicketDetailView###AccountedTimeDisplay is disabled." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 4.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-200", "description": "CWE-200 Information Exposure", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2022-03-21T09:15:52", "orgId": "2e1bf29f-dc29-4ed8-830c-7b9348b6f0e8", "shortName": "OTRS" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "https://otrs.com/release-notes/otrs-security-advisory-2022-06/" } ], "solutions": [ { "lang": "en", "value": "Update to OTRS 7.0.33 and OTRS 8.0.20." } ], "source": { "advisory": "OSA-2022-06", "defect": [ "2022011442000647" ], "discovery": "USER" }, "title": "Information disclosure in the External Interface", "x_generator": { "engine": "Vulnogram 0.0.9" }, "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "security@otrs.com", "DATE_PUBLIC": "2022-03-21T09:00:00.000Z", "ID": "CVE-2022-1004", "STATE": "PUBLIC", "TITLE": "Information disclosure in the External Interface" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "OTRS", "version": { "version_data": [ { "version_affected": "\u003c=", "version_name": "7.0.x", "version_value": "7.0.32" }, { "version_affected": "\u003c=", "version_name": "8.0.x", "version_value": "8.0.19" } ] } } ] }, "vendor_name": "OTRS AG" } ] } }, "credit": [ { "lang": "eng", "value": "Special thanks to Jasmin Hammes for reporting these vulnerability." } ], "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Accounted time is shown in the Ticket Detail View (External Interface), even if ExternalFrontend::TicketDetailView###AccountedTimeDisplay is disabled." } ] }, "generator": { "engine": "Vulnogram 0.0.9" }, "impact": { "cvss": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 4.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N", "version": "3.1" } }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "CWE-200 Information Exposure" } ] } ] }, "references": { "reference_data": [ { "name": "https://otrs.com/release-notes/otrs-security-advisory-2022-06/", "refsource": "CONFIRM", "url": "https://otrs.com/release-notes/otrs-security-advisory-2022-06/" } ] }, "solution": [ { "lang": "en", "value": "Update to OTRS 7.0.33 and OTRS 8.0.20." } ], "source": { "advisory": "OSA-2022-06", "defect": [ "2022011442000647" ], "discovery": "USER" } } } }, "cveMetadata": { "assignerOrgId": "2e1bf29f-dc29-4ed8-830c-7b9348b6f0e8", "assignerShortName": "OTRS", "cveId": "CVE-2022-1004", "datePublished": "2022-03-21T09:15:52.322368Z", "dateReserved": "2022-03-17T00:00:00", "dateUpdated": "2024-09-17T02:32:38.359Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2020-1771
Vulnerability from cvelistv5
Published
2020-03-27 12:47
Modified
2024-09-17 03:28
Severity ?
EPSS score ?
Summary
Attacker is able craft an article with a link to the customer address book with malicious content (JavaScript). When agent opens the link, JavaScript code is executed due to the missing parameter encoding. This issue affects: ((OTRS)) Community Edition: 6.0.26 and prior versions. OTRS: 7.0.15 and prior versions.
References
Impacted products
Vendor | Product | Version | |||||
---|---|---|---|---|---|---|---|
▼ | OTRS AG | ((OTRS)) Community Edition |
Version: 6.0.x < |
||||
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T06:46:30.886Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://otrs.com/release-notes/otrs-security-advisory-2020-08/" }, { "name": "openSUSE-SU-2020:0551", "tags": [ "vendor-advisory", "x_transferred" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2020-04/msg00038.html" }, { "name": "openSUSE-SU-2020:1475", "tags": [ "vendor-advisory", "x_transferred" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00066.html" }, { "name": "openSUSE-SU-2020:1509", "tags": [ "vendor-advisory", "x_transferred" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00077.html" }, { "name": "[debian-lts-announce] 20230831 [SECURITY] [DLA 3551-1] otrs2 security update", "tags": [ "mailing-list", "x_transferred" ], "url": "https://lists.debian.org/debian-lts-announce/2023/08/msg00040.html" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "((OTRS)) Community Edition", "vendor": "OTRS AG", "versions": [ { "lessThanOrEqual": "6.0.26", "status": "affected", "version": "6.0.x", "versionType": "custom" } ] }, { "product": "OTRS", "vendor": "OTRS AG", "versions": [ { "lessThanOrEqual": "7.0.15", "status": "affected", "version": "7.0.x", "versionType": "custom" } ] } ], "credits": [ { "lang": "en", "value": "Christoph Wuetschner" } ], "datePublic": "2020-03-27T00:00:00", "descriptions": [ { "lang": "en", "value": "Attacker is able craft an article with a link to the customer address book with malicious content (JavaScript). When agent opens the link, JavaScript code is executed due to the missing parameter encoding. This issue affects: ((OTRS)) Community Edition: 6.0.26 and prior versions. OTRS: 7.0.15 and prior versions." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 4.6, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:L/I:L/A:N", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-79", "description": "CWE-79 Cross-site Scripting (XSS)", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2023-08-31T02:06:17.362255", "orgId": "2e1bf29f-dc29-4ed8-830c-7b9348b6f0e8", "shortName": "OTRS" }, "references": [ { "url": "https://otrs.com/release-notes/otrs-security-advisory-2020-08/" }, { "name": "openSUSE-SU-2020:0551", "tags": [ "vendor-advisory" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2020-04/msg00038.html" }, { "name": "openSUSE-SU-2020:1475", "tags": [ "vendor-advisory" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00066.html" }, { "name": "openSUSE-SU-2020:1509", "tags": [ "vendor-advisory" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00077.html" }, { "name": "[debian-lts-announce] 20230831 [SECURITY] [DLA 3551-1] otrs2 security update", "tags": [ "mailing-list" ], "url": "https://lists.debian.org/debian-lts-announce/2023/08/msg00040.html" } ], "solutions": [ { "lang": "en", "value": "Upgrade to OTRS 7.0.16, ((OTRS)) Community Edition 6.0.27\n\nPatch for ((OTRS)) Community Edition 6: https://github.com/OTRS/otrs/commit/2576830053f70a3a9251558e55f34843dec61aa2" } ], "source": { "advisory": "OSA-2020-08", "defect": [ "2020022642002875" ], "discovery": "EXTERNAL" }, "title": "Possible XSS in Customer user address book", "x_generator": { "engine": "Vulnogram 0.0.9" } } }, "cveMetadata": { "assignerOrgId": "2e1bf29f-dc29-4ed8-830c-7b9348b6f0e8", "assignerShortName": "OTRS", "cveId": "CVE-2020-1771", "datePublished": "2020-03-27T12:47:49.462891Z", "dateReserved": "2019-11-29T00:00:00", "dateUpdated": "2024-09-17T03:28:52.085Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2021-36092
Vulnerability from cvelistv5
Published
2021-07-26 04:25
Modified
2024-09-17 03:02
Severity ?
EPSS score ?
Summary
It's possible to create an email which contains specially crafted link and it can be used to perform XSS attack. This issue affects: OTRS AG ((OTRS)) Community Edition:6.0.x version 6.0.1 and later versions. OTRS AG OTRS: 7.0.x version 7.0.27 and prior versions; 8.0.x version 8.0.14 and prior versions.
References
▼ | URL | Tags |
---|---|---|
https://otrs.com/release-notes/otrs-security-advisory-2021-15/ | x_refsource_CONFIRM |
Impacted products
Vendor | Product | Version | |||||
---|---|---|---|---|---|---|---|
▼ | OTRS AG | ((OTRS)) Community Edition |
Version: 6.0.1 < 6.0.x* |
||||
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T00:47:43.823Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://otrs.com/release-notes/otrs-security-advisory-2021-15/" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "((OTRS)) Community Edition", "vendor": "OTRS AG", "versions": [ { "lessThan": "6.0.x*", "status": "affected", "version": "6.0.1", "versionType": "custom" } ] }, { "product": "OTRS", "vendor": "OTRS AG", "versions": [ { "lessThanOrEqual": "7.0.27", "status": "affected", "version": "7.0.x", "versionType": "custom" }, { "lessThanOrEqual": "8.0.14", "status": "affected", "version": "8.0.x", "versionType": "custom" } ] } ], "datePublic": "2021-07-26T00:00:00", "descriptions": [ { "lang": "en", "value": "It\u0027s possible to create an email which contains specially crafted link and it can be used to perform XSS attack. This issue affects: OTRS AG ((OTRS)) Community Edition:6.0.x version 6.0.1 and later versions. OTRS AG OTRS: 7.0.x version 7.0.27 and prior versions; 8.0.x version 8.0.14 and prior versions." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-79", "description": "CWE-79 Cross-site Scripting (XSS)", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2021-07-26T04:25:43", "orgId": "2e1bf29f-dc29-4ed8-830c-7b9348b6f0e8", "shortName": "OTRS" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "https://otrs.com/release-notes/otrs-security-advisory-2021-15/" } ], "solutions": [ { "lang": "en", "value": "Update to OTRS 8.0.15 or OTRS 7.0.28." } ], "source": { "advisory": "OSA-2021-15", "defect": [ "2021061442000603" ], "discovery": "USER" }, "title": "XSS attack using special link in email", "x_generator": { "engine": "Vulnogram 0.0.9" }, "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "security@otrs.com", "DATE_PUBLIC": "2021-07-26T00:00:00.000Z", "ID": "CVE-2021-36092", "STATE": "PUBLIC", "TITLE": "XSS attack using special link in email" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "((OTRS)) Community Edition", "version": { "version_data": [ { "version_affected": "\u003e=", "version_name": "6.0.x", "version_value": "6.0.1" } ] } }, { "product_name": "OTRS", "version": { "version_data": [ { "version_affected": "\u003c=", "version_name": "7.0.x", "version_value": "7.0.27" }, { "version_affected": "\u003c=", "version_name": "8.0.x", "version_value": "8.0.14" } ] } } ] }, "vendor_name": "OTRS AG" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "It\u0027s possible to create an email which contains specially crafted link and it can be used to perform XSS attack. This issue affects: OTRS AG ((OTRS)) Community Edition:6.0.x version 6.0.1 and later versions. OTRS AG OTRS: 7.0.x version 7.0.27 and prior versions; 8.0.x version 8.0.14 and prior versions." } ] }, "generator": { "engine": "Vulnogram 0.0.9" }, "impact": { "cvss": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N", "version": "3.1" } }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "CWE-79 Cross-site Scripting (XSS)" } ] } ] }, "references": { "reference_data": [ { "name": "https://otrs.com/release-notes/otrs-security-advisory-2021-15/", "refsource": "CONFIRM", "url": "https://otrs.com/release-notes/otrs-security-advisory-2021-15/" } ] }, "solution": [ { "lang": "en", "value": "Update to OTRS 8.0.15 or OTRS 7.0.28." } ], "source": { "advisory": "OSA-2021-15", "defect": [ "2021061442000603" ], "discovery": "USER" } } } }, "cveMetadata": { "assignerOrgId": "2e1bf29f-dc29-4ed8-830c-7b9348b6f0e8", "assignerShortName": "OTRS", "cveId": "CVE-2021-36092", "datePublished": "2021-07-26T04:25:43.381697Z", "dateReserved": "2021-07-01T00:00:00", "dateUpdated": "2024-09-17T03:02:46.230Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2023-38060
Vulnerability from cvelistv5
Published
2023-07-24 08:28
Modified
2024-10-17 13:03
Severity ?
EPSS score ?
Summary
Improper Input Validation vulnerability in the ContentType parameter for attachments on TicketCreate or TicketUpdate operations of the OTRS Generic Interface modules allows any authenticated attacker to to perform an host header injection for the ContentType header of the attachment.
This issue affects OTRS: from 7.0.X before 7.0.45, from 8.0.X before 8.0.35; ((OTRS)) Community Edition: from 6.0.1 through 6.0.34.
References
Impacted products
Vendor | Product | Version | |||||
---|---|---|---|---|---|---|---|
▼ | OTRS AG | OTRS |
Version: 7.0.x Version: 8.0.x |
||||
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T17:30:13.644Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://otrs.com/release-notes/otrs-security-advisory-2023-04/" }, { "tags": [ "x_transferred" ], "url": "https://lists.debian.org/debian-lts-announce/2023/08/msg00040.html" } ], "title": "CVE Program Container" }, { "metrics": [ { "other": { "content": { "id": "CVE-2023-38060", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-10-17T13:01:31.274099Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-10-17T13:03:28.089Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "affected", "modules": [ "Generic Interface" ], "product": "OTRS", "vendor": "OTRS AG", "versions": [ { "lessThan": "7.0.45", "status": "affected", "version": "7.0.x", "versionType": "Patch" }, { "lessThan": "8.0.35", "status": "affected", "version": "8.0.x", "versionType": "Patch" } ] }, { "defaultStatus": "affected", "modules": [ "Generic Interface" ], "product": "((OTRS)) Community Edition", "vendor": "OTRS AG", "versions": [ { "lessThanOrEqual": "6.0.34", "status": "affected", "version": "6.0.1", "versionType": "All" } ] } ], "credits": [ { "lang": "en", "type": "finder", "user": "00000000-0000-4000-9000-000000000000", "value": "Special thanks to Tim P\u00fcttmanns for reporting these vulnerability." } ], "datePublic": "2023-07-24T07:00:00.000Z", "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "\u003cdiv\u003eImproper Input Validation vulnerability in the ContentType parameter for attachments on TicketCreate or TicketUpdate operations of the OTRS Generic Interface modules allows any authenticated attacker to to perform an host header injection for the ContentType header of the attachment.\u0026nbsp;\u003cbr\u003e\u003c/div\u003e\u003cp\u003eThis issue affects OTRS: from 7.0.X before 7.0.45, from 8.0.X before 8.0.35; ((OTRS)) Community Edition: from 6.0.1 through 6.0.34.\u003c/p\u003e" } ], "value": "Improper Input Validation vulnerability in the ContentType parameter for attachments on TicketCreate or TicketUpdate operations of the OTRS Generic Interface modules allows any authenticated attacker to to perform an host header injection for the ContentType header of the attachment.\u00a0\n\n\nThis issue affects OTRS: from 7.0.X before 7.0.45, from 8.0.X before 8.0.35; ((OTRS)) Community Edition: from 6.0.1 through 6.0.34.\n\n" } ], "impacts": [ { "capecId": "CAPEC-141", "descriptions": [ { "lang": "en", "value": "CAPEC-141 Cache Poisoning" } ] } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "LOW", "baseScore": 6.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-20", "description": "CWE-20 Improper Input Validation", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2023-07-24T08:28:13.816Z", "orgId": "2e1bf29f-dc29-4ed8-830c-7b9348b6f0e8", "shortName": "OTRS" }, "references": [ { "url": "https://otrs.com/release-notes/otrs-security-advisory-2023-04/" }, { "url": "https://lists.debian.org/debian-lts-announce/2023/08/msg00040.html" } ], "solutions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "Update to OTRS 8.0.35 or OTRS 7.0.45\u003cbr\u003e" } ], "value": "Update to OTRS 8.0.35 or OTRS 7.0.45\n" } ], "source": { "advisory": "OSA-2023-04", "defect": [ "Issue#1027", "Ticket#2023041142001466" ], "discovery": "EXTERNAL" }, "title": "Host header injection by attachments in web service", "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "2e1bf29f-dc29-4ed8-830c-7b9348b6f0e8", "assignerShortName": "OTRS", "cveId": "CVE-2023-38060", "datePublished": "2023-07-24T08:28:13.816Z", "dateReserved": "2023-07-12T08:05:38.781Z", "dateUpdated": "2024-10-17T13:03:28.089Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2024-43444
Vulnerability from cvelistv5
Published
2024-08-26 08:42
Modified
2024-08-29 07:36
Severity ?
EPSS score ?
Summary
Passwords of agents and customers are displayed in plain text in the OTRS admin log module if certain configurations regarding the authentication sources match and debugging for the authentication backend has been enabled.
This issue affects:
* OTRS from 7.0.X through 7.0.50
* OTRS 8.0.X
* OTRS 2023.X
* OTRS from 2024.X through 2024.5.X
* ((OTRS)) Community Edition: 6.0.x
Products based on the ((OTRS)) Community Edition also very likely to be affected
References
Impacted products
Vendor | Product | Version | |||||
---|---|---|---|---|---|---|---|
▼ | OTRS AG | OTRS |
Version: 7.0.x Version: 8.0.x Version: 2023.x Version: 2024.x |
||||
|
{ "containers": { "adp": [ { "affected": [ { "cpes": [ "cpe:2.3:a:otrs:otrs:*:*:*:*:*:*:*:*" ], "defaultStatus": "unaffected", "product": "otrs", "vendor": "otrs", "versions": [ { "lessThanOrEqual": "7.0.50", "status": "affected", "version": "7.0.0", "versionType": "custom" }, { "status": "affected", "version": "8.0.0" }, { "status": "affected", "version": "2023.0" }, { "lessThanOrEqual": "2024.5.0", "status": "affected", "version": "2024.0", "versionType": "custom" } ] }, { "cpes": [ "cpe:2.3:a:otrs:otrs:*:*:*:*:community:*:*:*" ], "defaultStatus": "affected", "product": "otrs", "vendor": "otrs", "versions": [ { "status": "affected", "version": "6.0.0" } ] } ], "metrics": [ { "other": { "content": { "id": "CVE-2024-43444", "options": [ { "Exploitation": "none" }, { "Automatable": "yes" }, { "Technical Impact": "total" } ], "role": "CISA Coordinator", "timestamp": "2024-08-26T13:57:06.436622Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-08-26T14:01:52.566Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "affected", "modules": [ "Log Module", "Agent Authentication", "Customer Authentication" ], "product": "OTRS", "vendor": "OTRS AG", "versions": [ { "lessThanOrEqual": "7.0.50", "status": "affected", "version": "7.0.x", "versionType": "Patch" }, { "status": "affected", "version": "8.0.x" }, { "status": "affected", "version": "2023.x" }, { "lessThanOrEqual": "2024.5.x", "status": "affected", "version": "2024.x", "versionType": "Patch" } ] }, { "defaultStatus": "affected", "modules": [ "Log Module", "Agent Authentication", "Customer Authentication" ], "product": "((OTRS)) Community Edition", "vendor": "OTRS AG", "versions": [ { "status": "affected", "version": "6.0.x" } ] } ], "datePublic": "2024-08-26T08:00:00.000Z", "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "\u003cdiv\u003ePasswords of agents and customers are displayed in plain text in the OTRS admin log module if certain configurations regarding the authentication sources match and debugging for the authentication backend has been enabled.\u003cbr\u003e\u003c/div\u003e\u003cdiv\u003e\u003cp\u003eThis issue affects: \u003c/p\u003e\u003cul\u003e\u003cli\u003eOTRS from 7.0.X through 7.0.50\u003c/li\u003e\u003cli\u003eOTRS 8.0.X\u003c/li\u003e\u003cli\u003eOTRS 2023.X\u003c/li\u003e\u003cli\u003eOTRS from 2024.X through 2024.5.X\u003c/li\u003e\u003cli\u003e((OTRS)) Community Edition: 6.0.x\u003cbr\u003e\u003c/li\u003e\u003c/ul\u003e\u003cdiv\u003eProducts based on the ((OTRS)) Community Edition also very likely to be affected\u003c/div\u003e\u003cbr\u003e\u003c/div\u003e" } ], "value": "Passwords of agents and customers are displayed in plain text in the OTRS admin log module if certain configurations regarding the authentication sources match and debugging for the authentication backend has been enabled.\n\nThis issue affects: \n\n * OTRS from 7.0.X through 7.0.50\n * OTRS 8.0.X\n * OTRS 2023.X\n * OTRS from 2024.X through 2024.5.X\n * ((OTRS)) Community Edition: 6.0.x\n\nProducts based on the ((OTRS)) Community Edition also very likely to be affected" } ], "impacts": [ { "capecId": "CAPEC-545", "descriptions": [ { "lang": "en", "value": "CAPEC-545 Pull Data from System Resources" } ] } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 8.2, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:L/A:N", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-532", "description": "CWE-532 Insertion of Sensitive Information into Log File", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-08-29T07:36:13.555Z", "orgId": "2e1bf29f-dc29-4ed8-830c-7b9348b6f0e8", "shortName": "OTRS" }, "references": [ { "url": "https://otrs.com/release-notes/otrs-security-advisory-2024-12/" } ], "solutions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "Update to OTRS 2024.6.x or OTRS 7.0.51\u003cbr\u003e" } ], "value": "Update to OTRS 2024.6.x or OTRS 7.0.51" } ], "source": { "advisory": "OSA-2024-12", "defect": [ "Issue#2725", "Ticket#2024072442001041", "Ticket#2024072442000677" ], "discovery": "USER" }, "title": "Passwords are written to Admin Log Module", "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "2e1bf29f-dc29-4ed8-830c-7b9348b6f0e8", "assignerShortName": "OTRS", "cveId": "CVE-2024-43444", "datePublished": "2024-08-26T08:42:58.796Z", "dateReserved": "2024-08-13T13:38:47.973Z", "dateUpdated": "2024-08-29T07:36:13.555Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2020-1777
Vulnerability from cvelistv5
Published
2020-10-15 18:52
Modified
2024-09-17 01:16
Severity ?
EPSS score ?
Summary
Agent names that participates in a chat conversation are revealed in certain parts of the external interface as well as in chat transcriptions inside the tickets, when system is configured to mask real agent names. This issue affects OTRS; 7.0.21 and prior versions, 8.0.6 and prior versions.
References
▼ | URL | Tags |
---|---|---|
https://otrs.com/release-notes/otrs-security-advisory-2020-15/ | x_refsource_CONFIRM |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T06:46:30.899Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://otrs.com/release-notes/otrs-security-advisory-2020-15/" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "OTRS", "vendor": "OTRS AG", "versions": [ { "lessThanOrEqual": "7.0.21", "status": "affected", "version": "7.0.x", "versionType": "custom" }, { "lessThanOrEqual": "8.0.6", "status": "affected", "version": "8.0.x", "versionType": "custom" } ] } ], "credits": [ { "lang": "en", "value": "L\u00e1szl\u00f3 Gyaraki" } ], "datePublic": "2020-10-12T00:00:00", "descriptions": [ { "lang": "en", "value": "Agent names that participates in a chat conversation are revealed in certain parts of the external interface as well as in chat transcriptions inside the tickets, when system is configured to mask real agent names. This issue affects OTRS; 7.0.21 and prior versions, 8.0.6 and prior versions." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 4.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-200", "description": "CWE-200 Information Exposure", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2020-10-15T18:52:13", "orgId": "2e1bf29f-dc29-4ed8-830c-7b9348b6f0e8", "shortName": "OTRS" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "https://otrs.com/release-notes/otrs-security-advisory-2020-15/" } ], "solutions": [ { "lang": "en", "value": "Upgrade to OTRS 7.0.22, OTRS 8.0.7" } ], "source": { "advisory": "OSA-2020-15", "defect": [ "2020052942000321" ], "discovery": "INTERNAL" }, "title": "Agent names disclosed in chat feature", "x_generator": { "engine": "Vulnogram 0.0.9" }, "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "security@otrs.com", "DATE_PUBLIC": "2020-10-12T00:00:00.000Z", "ID": "CVE-2020-1777", "STATE": "PUBLIC", "TITLE": "Agent names disclosed in chat feature" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "OTRS", "version": { "version_data": [ { "version_affected": "\u003c=", "version_name": "7.0.x", "version_value": "7.0.21" }, { "version_affected": "\u003c=", "version_name": "8.0.x", "version_value": "8.0.6" } ] } } ] }, "vendor_name": "OTRS AG" } ] } }, "credit": [ { "lang": "eng", "value": "L\u00e1szl\u00f3 Gyaraki" } ], "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Agent names that participates in a chat conversation are revealed in certain parts of the external interface as well as in chat transcriptions inside the tickets, when system is configured to mask real agent names. This issue affects OTRS; 7.0.21 and prior versions, 8.0.6 and prior versions." } ] }, "generator": { "engine": "Vulnogram 0.0.9" }, "impact": { "cvss": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 4.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N", "version": "3.1" } }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "CWE-200 Information Exposure" } ] } ] }, "references": { "reference_data": [ { "name": "https://otrs.com/release-notes/otrs-security-advisory-2020-15/", "refsource": "CONFIRM", "url": "https://otrs.com/release-notes/otrs-security-advisory-2020-15/" } ] }, "solution": [ { "lang": "en", "value": "Upgrade to OTRS 7.0.22, OTRS 8.0.7" } ], "source": { "advisory": "OSA-2020-15", "defect": [ "2020052942000321" ], "discovery": "INTERNAL" } } } }, "cveMetadata": { "assignerOrgId": "2e1bf29f-dc29-4ed8-830c-7b9348b6f0e8", "assignerShortName": "OTRS", "cveId": "CVE-2020-1777", "datePublished": "2020-10-15T18:52:13.636983Z", "dateReserved": "2019-11-29T00:00:00", "dateUpdated": "2024-09-17T01:16:05.690Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2023-2534
Vulnerability from cvelistv5
Published
2023-05-08 07:29
Modified
2024-08-02 06:26
Severity ?
EPSS score ?
Summary
Improper Authorization vulnerability in OTRS AG OTRS 8 (Websocket API backend) allows any as Agent authenticated attacker to track user behaviour and to gain live insight into overall system usage. User IDs can easily be correlated with real names e. g. via
ticket histories by any user. (Fuzzing for garnering other adjacent user/sensitive data). Subscribing to all possible push events could also lead to performance implications on the server side, depending on the size of the installation
and the number of active users. (Flooding)This issue affects OTRS: from 8.0.X before 8.0.32.
References
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T06:26:09.833Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://otrs.com/release-notes/otrs-security-advisory-2023-03/" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "defaultStatus": "affected", "modules": [ "Websocket API" ], "product": "OTRS", "vendor": "OTRS AG", "versions": [ { "lessThan": "8.0.32", "status": "affected", "version": "8.0.x", "versionType": "Patch" } ] } ], "credits": [ { "lang": "en", "type": "finder", "user": "00000000-0000-4000-9000-000000000000", "value": "Special thanks to Maximilian Gutwein for reporting these vulnerability." } ], "datePublic": "2023-05-08T07:00:00.000Z", "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "Improper Authorization vulnerability in OTRS AG OTRS 8 (Websocket API backend) allows any as Agent authenticated attacker to track user behaviour and to gain live insight into overall system usage. User IDs can easily be correlated with real names e. g. via\u003cbr\u003eticket histories by any user. (Fuzzing for garnering other adjacent user/sensitive data).\u0026nbsp;Subscribing to all possible push events could also lead to performance implications on the server side, depending on the size of the installation\u003cbr\u003eand the number of active users. (Flooding)\u003cp\u003eThis issue affects OTRS: from 8.0.X before 8.0.32.\u003c/p\u003e" } ], "value": "Improper Authorization vulnerability in OTRS AG OTRS 8 (Websocket API backend) allows any as Agent authenticated attacker to track user behaviour and to gain live insight into overall system usage. User IDs can easily be correlated with real names e. g. via\nticket histories by any user. (Fuzzing for garnering other adjacent user/sensitive data).\u00a0Subscribing to all possible push events could also lead to performance implications on the server side, depending on the size of the installation\nand the number of active users. (Flooding)This issue affects OTRS: from 8.0.X before 8.0.32.\n\n" } ], "impacts": [ { "capecId": "CAPEC-261", "descriptions": [ { "lang": "en", "value": "CAPEC-261 Fuzzing for garnering other adjacent user/sensitive data" } ] }, { "capecId": "CAPEC-125", "descriptions": [ { "lang": "en", "value": "CAPEC-125 Flooding" } ] } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "LOW", "baseScore": 7.6, "baseSeverity": "HIGH", "confidentialityImpact": "LOW", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:H/A:L", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-285", "description": "CWE-285 Improper Authorization", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2023-05-08T07:55:19.365Z", "orgId": "2e1bf29f-dc29-4ed8-830c-7b9348b6f0e8", "shortName": "OTRS" }, "references": [ { "url": "https://otrs.com/release-notes/otrs-security-advisory-2023-03/" } ], "solutions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "Update to OTRS 8.0.32\u003cbr\u003e" } ], "value": "Update to OTRS 8.0.32\n" } ], "source": { "advisory": "OSA-2023-03", "defect": [ "500", "2022122042001337" ], "discovery": "EXTERNAL" }, "title": "Information disclouse and DoS via websocket push events", "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "2e1bf29f-dc29-4ed8-830c-7b9348b6f0e8", "assignerShortName": "OTRS", "cveId": "CVE-2023-2534", "datePublished": "2023-05-08T07:29:49.293Z", "dateReserved": "2023-05-05T06:14:04.360Z", "dateUpdated": "2024-08-02T06:26:09.833Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2021-21440
Vulnerability from cvelistv5
Published
2021-07-26 04:25
Modified
2024-09-16 17:43
Severity ?
EPSS score ?
Summary
Generated Support Bundles contains private S/MIME and PGP keys if containing folder is not hidden. This issue affects: OTRS AG ((OTRS)) Community Edition 6.0.x version 6.0.1 and later versions. OTRS AG OTRS 7.0.x version 7.0.27 and prior versions; 8.0.x version 8.0.14 and prior versions.
References
Impacted products
Vendor | Product | Version | |||||
---|---|---|---|---|---|---|---|
▼ | OTRS AG | ((OTRS)) Community Edition |
Version: 6.0.1 < 6.0.x* |
||||
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T18:16:22.320Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://otrs.com/release-notes/otrs-security-advisory-2021-10/" }, { "name": "[debian-lts-announce] 20230831 [SECURITY] [DLA 3551-1] otrs2 security update", "tags": [ "mailing-list", "x_transferred" ], "url": "https://lists.debian.org/debian-lts-announce/2023/08/msg00040.html" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "((OTRS)) Community Edition", "vendor": "OTRS AG", "versions": [ { "lessThan": "6.0.x*", "status": "affected", "version": "6.0.1", "versionType": "custom" } ] }, { "product": "OTRS", "vendor": "OTRS AG", "versions": [ { "lessThanOrEqual": "7.0.27", "status": "affected", "version": "7.0.x", "versionType": "custom" }, { "lessThanOrEqual": "8.0.14", "status": "affected", "version": "8.0.x", "versionType": "custom" } ] } ], "credits": [ { "lang": "en", "value": "Julian Droste" } ], "datePublic": "2021-07-26T00:00:00", "descriptions": [ { "lang": "en", "value": "Generated Support Bundles contains private S/MIME and PGP keys if containing folder is not hidden. This issue affects: OTRS AG ((OTRS)) Community Edition 6.0.x version 6.0.1 and later versions. OTRS AG OTRS 7.0.x version 7.0.27 and prior versions; 8.0.x version 8.0.14 and prior versions." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.2, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "LOW", "privilegesRequired": "HIGH", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:U/C:H/I:L/A:N", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-200", "description": "CWE-200 Information Exposure", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2023-08-31T02:06:58.211209", "orgId": "2e1bf29f-dc29-4ed8-830c-7b9348b6f0e8", "shortName": "OTRS" }, "references": [ { "url": "https://otrs.com/release-notes/otrs-security-advisory-2021-10/" }, { "name": "[debian-lts-announce] 20230831 [SECURITY] [DLA 3551-1] otrs2 security update", "tags": [ "mailing-list" ], "url": "https://lists.debian.org/debian-lts-announce/2023/08/msg00040.html" } ], "solutions": [ { "lang": "en", "value": "Update to OTRS 8.0.15 or OTRS 7.0.28." } ], "source": { "advisory": "OSA-2021-10", "defect": [ "2021050342000331" ], "discovery": "USER" }, "title": "Support Bundle includes S/Mime and PGP keys", "x_generator": { "engine": "Vulnogram 0.0.9" } } }, "cveMetadata": { "assignerOrgId": "2e1bf29f-dc29-4ed8-830c-7b9348b6f0e8", "assignerShortName": "OTRS", "cveId": "CVE-2021-21440", "datePublished": "2021-07-26T04:25:37.050952Z", "dateReserved": "2020-12-29T00:00:00", "dateUpdated": "2024-09-16T17:43:49.726Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2020-1772
Vulnerability from cvelistv5
Published
2020-03-27 12:47
Modified
2024-09-16 23:25
Severity ?
EPSS score ?
Summary
It's possible to craft Lost Password requests with wildcards in the Token value, which allows attacker to retrieve valid Token(s), generated by users which already requested new passwords. This issue affects: ((OTRS)) Community Edition 5.0.41 and prior versions, 6.0.26 and prior versions. OTRS: 7.0.15 and prior versions.
References
Impacted products
Vendor | Product | Version | |||||
---|---|---|---|---|---|---|---|
▼ | OTRS AG | ((OTRS)) Community Edition |
Version: 5.0.x < Version: 6.0.x < |
||||
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T06:46:30.921Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://otrs.com/release-notes/otrs-security-advisory-2020-09/" }, { "name": "openSUSE-SU-2020:0551", "tags": [ "vendor-advisory", "x_transferred" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2020-04/msg00038.html" }, { "name": "[debian-lts-announce] 20200501 [SECURITY] [DLA 2198-1] otrs2 security update", "tags": [ "mailing-list", "x_transferred" ], "url": "https://lists.debian.org/debian-lts-announce/2020/05/msg00000.html" }, { "name": "openSUSE-SU-2020:1475", "tags": [ "vendor-advisory", "x_transferred" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00066.html" }, { "name": "openSUSE-SU-2020:1509", "tags": [ "vendor-advisory", "x_transferred" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00077.html" }, { "name": "[debian-lts-announce] 20230831 [SECURITY] [DLA 3551-1] otrs2 security update", "tags": [ "mailing-list", "x_transferred" ], "url": "https://lists.debian.org/debian-lts-announce/2023/08/msg00040.html" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "((OTRS)) Community Edition", "vendor": "OTRS AG", "versions": [ { "lessThanOrEqual": "5.0.41", "status": "affected", "version": "5.0.x", "versionType": "custom" }, { "lessThanOrEqual": "6.0.26", "status": "affected", "version": "6.0.x", "versionType": "custom" } ] }, { "product": "OTRS", "vendor": "OTRS AG", "versions": [ { "lessThanOrEqual": "7.0.15", "status": "affected", "version": "7.0.x", "versionType": "custom" } ] } ], "credits": [ { "lang": "en", "value": "Fabian Henneke" } ], "datePublic": "2020-03-27T00:00:00", "descriptions": [ { "lang": "en", "value": "It\u0027s possible to craft Lost Password requests with wildcards in the Token value, which allows attacker to retrieve valid Token(s), generated by users which already requested new passwords. This issue affects: ((OTRS)) Community Edition 5.0.41 and prior versions, 6.0.26 and prior versions. OTRS: 7.0.15 and prior versions." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:L/A:N", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-155", "description": "CWE-155", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2023-08-31T02:06:30.794451", "orgId": "2e1bf29f-dc29-4ed8-830c-7b9348b6f0e8", "shortName": "OTRS" }, "references": [ { "url": "https://otrs.com/release-notes/otrs-security-advisory-2020-09/" }, { "name": "openSUSE-SU-2020:0551", "tags": [ "vendor-advisory" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2020-04/msg00038.html" }, { "name": "[debian-lts-announce] 20200501 [SECURITY] [DLA 2198-1] otrs2 security update", "tags": [ "mailing-list" ], "url": "https://lists.debian.org/debian-lts-announce/2020/05/msg00000.html" }, { "name": "openSUSE-SU-2020:1475", "tags": [ "vendor-advisory" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00066.html" }, { "name": "openSUSE-SU-2020:1509", "tags": [ "vendor-advisory" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00077.html" }, { "name": "[debian-lts-announce] 20230831 [SECURITY] [DLA 3551-1] otrs2 security update", "tags": [ "mailing-list" ], "url": "https://lists.debian.org/debian-lts-announce/2023/08/msg00040.html" } ], "solutions": [ { "lang": "en", "value": "Upgrade to OTRS 7.0.16, ((OTRS)) Community Edition 6.0.27, 5.0.42\n\nPatch for ((OTRS)) Community Edition 6: https://github.com/OTRS/otrs/commit/c0255365d5c455272b2b9e7bb1f6c96c3fce441b\nPatch for ((OTRS)) Community Edition 5: https://github.com/OTRS/otrs/commit/96cc7826d6ce260204ff629fc968edd2787b7f6b" } ], "source": { "advisory": "OSA-2020-09", "defect": [ "2020012742001563" ], "discovery": "EXTERNAL" }, "title": "Information Disclosure", "x_generator": { "engine": "Vulnogram 0.0.9" } } }, "cveMetadata": { "assignerOrgId": "2e1bf29f-dc29-4ed8-830c-7b9348b6f0e8", "assignerShortName": "OTRS", "cveId": "CVE-2020-1772", "datePublished": "2020-03-27T12:47:49.502529Z", "dateReserved": "2019-11-29T00:00:00", "dateUpdated": "2024-09-16T23:25:42.434Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2020-1774
Vulnerability from cvelistv5
Published
2020-04-28 13:54
Modified
2024-09-16 18:13
Severity ?
EPSS score ?
Summary
When user downloads PGP or S/MIME keys/certificates, exported file has same name for private and public keys. Therefore it's possible to mix them and to send private key to the third-party instead of public key. This issue affects ((OTRS)) Community Edition: 5.0.42 and prior versions, 6.0.27 and prior versions. OTRS: 7.0.16 and prior versions.
References
Impacted products
Vendor | Product | Version | |||||
---|---|---|---|---|---|---|---|
▼ | OTRS AG | ((OTRS)) Community Edition |
Version: 6.0.x <= 6.0.27 Version: 5.0.x <= 5.0.42 |
||||
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T06:46:30.951Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://otrs.com/release-notes/otrs-security-advisory-2020-11/" }, { "name": "[debian-lts-announce] 20200501 [SECURITY] [DLA 2198-1] otrs2 security update", "tags": [ "mailing-list", "x_transferred" ], "url": "https://lists.debian.org/debian-lts-announce/2020/05/msg00000.html" }, { "name": "[debian-lts-announce] 20230831 [SECURITY] [DLA 3551-1] otrs2 security update", "tags": [ "mailing-list", "x_transferred" ], "url": "https://lists.debian.org/debian-lts-announce/2023/08/msg00040.html" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "((OTRS)) Community Edition", "vendor": "OTRS AG", "versions": [ { "status": "affected", "version": "6.0.x \u003c= 6.0.27" }, { "status": "affected", "version": "5.0.x \u003c= 5.0.42" } ] }, { "product": "OTRS", "vendor": "OTRS AG", "versions": [ { "status": "affected", "version": "7.0.x \u003c= 7.0.16" } ] } ], "credits": [ { "lang": "en", "value": "Matthias Terlinde" } ], "datePublic": "2020-04-27T00:00:00", "descriptions": [ { "lang": "en", "value": "When user downloads PGP or S/MIME keys/certificates, exported file has same name for private and public keys. Therefore it\u0027s possible to mix them and to send private key to the third-party instead of public key. This issue affects ((OTRS)) Community Edition: 5.0.42 and prior versions, 6.0.27 and prior versions. OTRS: 7.0.16 and prior versions." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 4.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "HIGH", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:U/C:H/I:N/A:N", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-201", "description": "CWE-201 Information Exposure Through Sent Data", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2023-08-31T02:07:06.193689", "orgId": "2e1bf29f-dc29-4ed8-830c-7b9348b6f0e8", "shortName": "OTRS" }, "references": [ { "url": "https://otrs.com/release-notes/otrs-security-advisory-2020-11/" }, { "name": "[debian-lts-announce] 20200501 [SECURITY] [DLA 2198-1] otrs2 security update", "tags": [ "mailing-list" ], "url": "https://lists.debian.org/debian-lts-announce/2020/05/msg00000.html" }, { "name": "[debian-lts-announce] 20230831 [SECURITY] [DLA 3551-1] otrs2 security update", "tags": [ "mailing-list" ], "url": "https://lists.debian.org/debian-lts-announce/2023/08/msg00040.html" } ], "solutions": [ { "lang": "en", "value": "Upgrade to OTRS 7.0.17, ((OTRS)) Community Edition 6.0.28\nPatch for ((OTRS)) Community Edition 6: https://github.com/OTRS/otrs/commit/ff725cbea77f03fa296bb13f93f5b07086920342\nPatch for ((OTRS)) Community Edition 5: https://github.com/OTRS/otrs/commit/fb0e6131e79aa2ba9c7acbd16f4ee4e73289f64b" } ], "source": { "advisory": "OSA-2020-11", "defect": [ "2020021442001602" ], "discovery": "USER" }, "title": "Information disclosure", "x_generator": { "engine": "Vulnogram 0.0.9" } } }, "cveMetadata": { "assignerOrgId": "2e1bf29f-dc29-4ed8-830c-7b9348b6f0e8", "assignerShortName": "OTRS", "cveId": "CVE-2020-1774", "datePublished": "2020-04-28T13:54:26.180850Z", "dateReserved": "2019-11-29T00:00:00", "dateUpdated": "2024-09-16T18:13:37.691Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2020-1776
Vulnerability from cvelistv5
Published
2020-07-20 21:04
Modified
2024-09-17 00:26
Severity ?
EPSS score ?
Summary
When an agent user is renamed or set to invalid the session belonging to the user is keept active. The session can not be used to access ticket data in the case the agent is invalid. This issue affects ((OTRS)) Community Edition: 6.0.28 and prior versions. OTRS: 7.0.18 and prior versions, 8.0.4. and prior versions.
References
Impacted products
Vendor | Product | Version | |||||
---|---|---|---|---|---|---|---|
▼ | OTRS AG | ((OTRS)) Community Edition |
Version: 6.0.x < |
||||
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T06:46:30.918Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://otrs.com/release-notes/otrs-security-advisory-2020-13/" }, { "name": "[debian-lts-announce] 20230831 [SECURITY] [DLA 3551-1] otrs2 security update", "tags": [ "mailing-list", "x_transferred" ], "url": "https://lists.debian.org/debian-lts-announce/2023/08/msg00040.html" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "((OTRS)) Community Edition", "vendor": "OTRS AG", "versions": [ { "lessThanOrEqual": "6.0.28", "status": "affected", "version": "6.0.x", "versionType": "custom" } ] }, { "product": "OTRS", "vendor": "OTRS AG", "versions": [ { "lessThanOrEqual": "7.0.18", "status": "affected", "version": "7.0.x", "versionType": "custom" }, { "lessThanOrEqual": "8.0.4", "status": "affected", "version": "8.0.x", "versionType": "custom" } ] } ], "credits": [ { "lang": "en", "value": "Marvin Voormann" } ], "datePublic": "2020-07-20T00:00:00", "descriptions": [ { "lang": "en", "value": "When an agent user is renamed or set to invalid the session belonging to the user is keept active. The session can not be used to access ticket data in the case the agent is invalid. This issue affects ((OTRS)) Community Edition: 6.0.28 and prior versions. OTRS: 7.0.18 and prior versions, 8.0.4. and prior versions." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 3.5, "baseSeverity": "LOW", "confidentialityImpact": "LOW", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:L/I:N/A:N", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-613", "description": "CWE-613 Insufficient Session Expiration", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2023-08-31T02:07:12.227150", "orgId": "2e1bf29f-dc29-4ed8-830c-7b9348b6f0e8", "shortName": "OTRS" }, "references": [ { "url": "https://otrs.com/release-notes/otrs-security-advisory-2020-13/" }, { "name": "[debian-lts-announce] 20230831 [SECURITY] [DLA 3551-1] otrs2 security update", "tags": [ "mailing-list" ], "url": "https://lists.debian.org/debian-lts-announce/2023/08/msg00040.html" } ], "solutions": [ { "lang": "en", "value": "Upgrade to OTRS 8.0.5, OTRS 7.0.19, ((OTRS)) Community Edition 6.0.29\nPatch for ((OTRS)) Community Edition 6: https://github.com/OTRS/otrs/commit/4514f95f747be368c3dc9a9452ff9aa66506648d" } ], "source": { "advisory": "OSA-2020-13", "defect": [ "2020052042004084" ], "discovery": "INTERNAL" }, "title": "Invalidating or changing user does not invalidate session", "x_generator": { "engine": "Vulnogram 0.0.9" } } }, "cveMetadata": { "assignerOrgId": "2e1bf29f-dc29-4ed8-830c-7b9348b6f0e8", "assignerShortName": "OTRS", "cveId": "CVE-2020-1776", "datePublished": "2020-07-20T21:04:19.291845Z", "dateReserved": "2019-11-29T00:00:00", "dateUpdated": "2024-09-17T00:26:58.722Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2021-21441
Vulnerability from cvelistv5
Published
2021-06-16 09:50
Modified
2024-09-16 16:23
Severity ?
EPSS score ?
Summary
There is a XSS vulnerability in the ticket overview screens. It's possible to collect various information by having an e-mail shown in the overview screen. Attack can be performed by sending specially crafted e-mail to the system and it doesn't require any user intraction. This issue affects: OTRS AG ((OTRS)) Community Edition 6.0.x version 6.0.1 and later versions. OTRS AG OTRS 7.0.x version 7.0.26 and prior versions.
References
Impacted products
Vendor | Product | Version | |||||
---|---|---|---|---|---|---|---|
▼ | OTRS AG | ((OTRS)) Community Edition |
Version: 6.0.1 < 6.0.x* |
||||
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T18:16:22.242Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://otrs.com/release-notes/otrs-security-advisory-2021-11/" }, { "name": "[debian-lts-announce] 20230831 [SECURITY] [DLA 3551-1] otrs2 security update", "tags": [ "mailing-list", "x_transferred" ], "url": "https://lists.debian.org/debian-lts-announce/2023/08/msg00040.html" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "((OTRS)) Community Edition", "vendor": "OTRS AG", "versions": [ { "lessThan": "6.0.x*", "status": "affected", "version": "6.0.1", "versionType": "custom" } ] }, { "product": "OTRS", "vendor": "OTRS AG", "versions": [ { "lessThanOrEqual": "7.0.26", "status": "affected", "version": "7.0.x", "versionType": "custom" } ] } ], "datePublic": "2021-06-16T00:00:00", "descriptions": [ { "lang": "en", "value": "There is a XSS vulnerability in the ticket overview screens. It\u0027s possible to collect various information by having an e-mail shown in the overview screen. Attack can be performed by sending specially crafted e-mail to the system and it doesn\u0027t require any user intraction. This issue affects: OTRS AG ((OTRS)) Community Edition 6.0.x version 6.0.1 and later versions. OTRS AG OTRS 7.0.x version 7.0.26 and prior versions." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-79", "description": "CWE-79 Cross-site Scripting (XSS)", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2023-08-31T02:06:27.744989", "orgId": "2e1bf29f-dc29-4ed8-830c-7b9348b6f0e8", "shortName": "OTRS" }, "references": [ { "url": "https://otrs.com/release-notes/otrs-security-advisory-2021-11/" }, { "name": "[debian-lts-announce] 20230831 [SECURITY] [DLA 3551-1] otrs2 security update", "tags": [ "mailing-list" ], "url": "https://lists.debian.org/debian-lts-announce/2023/08/msg00040.html" } ], "solutions": [ { "lang": "en", "value": "Update to OTRS 7.0.27." } ], "source": { "advisory": "OSA-2021-11", "defect": [ "2021042142004313" ], "discovery": "EXTERNAL" }, "title": "XSS in the ticket overview screens", "x_generator": { "engine": "Vulnogram 0.0.9" } } }, "cveMetadata": { "assignerOrgId": "2e1bf29f-dc29-4ed8-830c-7b9348b6f0e8", "assignerShortName": "OTRS", "cveId": "CVE-2021-21441", "datePublished": "2021-06-16T09:50:11.263977Z", "dateReserved": "2020-12-29T00:00:00", "dateUpdated": "2024-09-16T16:23:02.452Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2020-1766
Vulnerability from cvelistv5
Published
2020-01-10 15:08
Modified
2024-09-17 00:10
Severity ?
EPSS score ?
Summary
Due to improper handling of uploaded images it is possible in very unlikely and rare conditions to force the agents browser to execute malicious javascript from a special crafted SVG file rendered as inline jpg file. This issue affects: ((OTRS)) Community Edition 5.0.x version 5.0.39 and prior versions; 6.0.x version 6.0.24 and prior versions. OTRS 7.0.x version 7.0.13 and prior versions.
References
Impacted products
Vendor | Product | Version | |||||
---|---|---|---|---|---|---|---|
▼ | OTRS AG | ((OTRS)) Community Edition |
Version: 5.0.x version 5.0.39 and prior versions Version: 6.0.x version 6.0.24 and prior versions |
||||
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T06:46:30.931Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://otrs.com/release-notes/otrs-security-advisory-2020-02/" }, { "name": "[debian-lts-announce] 20200129 [SECURITY] [DLA 2079-1] otrs2 security update", "tags": [ "mailing-list", "x_transferred" ], "url": "https://lists.debian.org/debian-lts-announce/2020/01/msg00027.html" }, { "name": "openSUSE-SU-2020:0551", "tags": [ "vendor-advisory", "x_transferred" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2020-04/msg00038.html" }, { "name": "openSUSE-SU-2020:1475", "tags": [ "vendor-advisory", "x_transferred" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00066.html" }, { "name": "openSUSE-SU-2020:1509", "tags": [ "vendor-advisory", "x_transferred" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00077.html" }, { "name": "[debian-lts-announce] 20230831 [SECURITY] [DLA 3551-1] otrs2 security update", "tags": [ "mailing-list", "x_transferred" ], "url": "https://lists.debian.org/debian-lts-announce/2023/08/msg00040.html" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "((OTRS)) Community Edition", "vendor": "OTRS AG", "versions": [ { "status": "affected", "version": "5.0.x version 5.0.39 and prior versions" }, { "status": "affected", "version": "6.0.x version 6.0.24 and prior versions" } ] }, { "product": "OTRS", "vendor": "OTRS AG", "versions": [ { "status": "affected", "version": "7.0.x version 7.0.13 and prior versions" } ] } ], "credits": [ { "lang": "en", "value": "Anton Astaf\u0027ev" } ], "datePublic": "2020-01-10T00:00:00", "descriptions": [ { "lang": "en", "value": "Due to improper handling of uploaded images it is possible in very unlikely and rare conditions to force the agents browser to execute malicious javascript from a special crafted SVG file rendered as inline jpg file. This issue affects: ((OTRS)) Community Edition 5.0.x version 5.0.39 and prior versions; 6.0.x version 6.0.24 and prior versions. OTRS 7.0.x version 7.0.13 and prior versions." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 2, "baseSeverity": "LOW", "confidentialityImpact": "NONE", "integrityImpact": "LOW", "privilegesRequired": "HIGH", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:H/UI:R/S:U/C:N/I:L/A:N", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-79", "description": "CWE-79 Cross-site Scripting (XSS)", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2023-08-31T02:06:59.708432", "orgId": "2e1bf29f-dc29-4ed8-830c-7b9348b6f0e8", "shortName": "OTRS" }, "references": [ { "url": "https://otrs.com/release-notes/otrs-security-advisory-2020-02/" }, { "name": "[debian-lts-announce] 20200129 [SECURITY] [DLA 2079-1] otrs2 security update", "tags": [ "mailing-list" ], "url": "https://lists.debian.org/debian-lts-announce/2020/01/msg00027.html" }, { "name": "openSUSE-SU-2020:0551", "tags": [ "vendor-advisory" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2020-04/msg00038.html" }, { "name": "openSUSE-SU-2020:1475", "tags": [ "vendor-advisory" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00066.html" }, { "name": "openSUSE-SU-2020:1509", "tags": [ "vendor-advisory" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00077.html" }, { "name": "[debian-lts-announce] 20230831 [SECURITY] [DLA 3551-1] otrs2 security update", "tags": [ "mailing-list" ], "url": "https://lists.debian.org/debian-lts-announce/2023/08/msg00040.html" } ], "solutions": [ { "lang": "en", "value": "Upgrade to OTRS 7.0.14, ((OTRS)) Community Edition 6.0.25, ((OTRS)) Community Edition 5.0.40" }, { "lang": "en", "value": "Patch for ((OTRS)) Community Edition 6: https://github.com/OTRS/otrs/commit/128078b0bb30f601ed97d4a13906644264ee6013 \nPatch for ((OTRS)) Community Edition 5: https://github.com/OTRS/otrs/commit/b7d80f9000fc9a435743d8d1d7d44d9a17483a9a" } ], "source": { "advisory": "OSA-2020-02", "defect": [ "2019112942001838" ], "discovery": "EXTERNAL" }, "title": "Improper handling of uploaded inline images", "x_generator": { "engine": "Vulnogram 0.0.9" } } }, "cveMetadata": { "assignerOrgId": "2e1bf29f-dc29-4ed8-830c-7b9348b6f0e8", "assignerShortName": "OTRS", "cveId": "CVE-2020-1766", "datePublished": "2020-01-10T15:08:57.704919Z", "dateReserved": "2019-11-29T00:00:00", "dateUpdated": "2024-09-17T00:10:59.231Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2021-36093
Vulnerability from cvelistv5
Published
2021-09-06 13:15
Modified
2024-09-16 20:36
Severity ?
EPSS score ?
Summary
It's possible to create an email which can be stuck while being processed by PostMaster filters, causing DoS. This issue affects: OTRS AG ((OTRS)) Community Edition 6.0.x version 6.0.1 and later versions. OTRS AG OTRS 7.0.x version 7.0.28 and prior versions; 8.0.x version 8.0.15 and prior versions.
References
▼ | URL | Tags |
---|---|---|
https://otrs.com/release-notes/otrs-security-advisory-2021-16/ | x_refsource_CONFIRM |
Impacted products
Vendor | Product | Version | |||||
---|---|---|---|---|---|---|---|
▼ | OTRS AG | ((OTRS)) Community Edition |
Version: 6.0.1 < 6.0.x* |
||||
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T00:47:43.937Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://otrs.com/release-notes/otrs-security-advisory-2021-16/" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "((OTRS)) Community Edition", "vendor": "OTRS AG", "versions": [ { "lessThan": "6.0.x*", "status": "affected", "version": "6.0.1", "versionType": "custom" } ] }, { "product": "OTRS", "vendor": "OTRS AG", "versions": [ { "lessThanOrEqual": "7.0.28", "status": "affected", "version": "7.0.x", "versionType": "custom" }, { "lessThanOrEqual": "8.0.15", "status": "affected", "version": "8.0.x", "versionType": "custom" } ] } ], "credits": [ { "lang": "en", "value": "Alberto Molina" } ], "datePublic": "2021-09-06T00:00:00", "descriptions": [ { "lang": "en", "value": "It\u0027s possible to create an email which can be stuck while being processed by PostMaster filters, causing DoS. This issue affects: OTRS AG ((OTRS)) Community Edition 6.0.x version 6.0.1 and later versions. OTRS AG OTRS 7.0.x version 7.0.28 and prior versions; 8.0.x version 8.0.15 and prior versions." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "LOW", "baseScore": 5.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-185", "description": "CWE-185 Incorrect Regular Expression", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2021-09-06T13:15:23", "orgId": "2e1bf29f-dc29-4ed8-830c-7b9348b6f0e8", "shortName": "OTRS" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "https://otrs.com/release-notes/otrs-security-advisory-2021-16/" } ], "solutions": [ { "lang": "en", "value": "Update to OTRS 8.0.16, OTRS 7.0.29." } ], "source": { "advisory": "OSA-2021-16", "defect": [ "2021070842000819" ], "discovery": "USER" }, "title": "DoS attack using PostMaster filters", "x_generator": { "engine": "Vulnogram 0.0.9" }, "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "security@otrs.com", "DATE_PUBLIC": "2021-09-06T00:00:00.000Z", "ID": "CVE-2021-36093", "STATE": "PUBLIC", "TITLE": "DoS attack using PostMaster filters" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "((OTRS)) Community Edition", "version": { "version_data": [ { "version_affected": "\u003e=", "version_name": "6.0.x", "version_value": "6.0.1" } ] } }, { "product_name": "OTRS", "version": { "version_data": [ { "version_affected": "\u003c=", "version_name": "7.0.x", "version_value": "7.0.28" }, { "version_affected": "\u003c=", "version_name": "8.0.x", "version_value": "8.0.15" } ] } } ] }, "vendor_name": "OTRS AG" } ] } }, "credit": [ { "lang": "eng", "value": "Alberto Molina" } ], "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "It\u0027s possible to create an email which can be stuck while being processed by PostMaster filters, causing DoS. This issue affects: OTRS AG ((OTRS)) Community Edition 6.0.x version 6.0.1 and later versions. OTRS AG OTRS 7.0.x version 7.0.28 and prior versions; 8.0.x version 8.0.15 and prior versions." } ] }, "generator": { "engine": "Vulnogram 0.0.9" }, "impact": { "cvss": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "LOW", "baseScore": 5.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L", "version": "3.1" } }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "CWE-185 Incorrect Regular Expression" } ] } ] }, "references": { "reference_data": [ { "name": "https://otrs.com/release-notes/otrs-security-advisory-2021-16/", "refsource": "CONFIRM", "url": "https://otrs.com/release-notes/otrs-security-advisory-2021-16/" } ] }, "solution": [ { "lang": "en", "value": "Update to OTRS 8.0.16, OTRS 7.0.29." } ], "source": { "advisory": "OSA-2021-16", "defect": [ "2021070842000819" ], "discovery": "USER" } } } }, "cveMetadata": { "assignerOrgId": "2e1bf29f-dc29-4ed8-830c-7b9348b6f0e8", "assignerShortName": "OTRS", "cveId": "CVE-2021-36093", "datePublished": "2021-09-06T13:15:24.049964Z", "dateReserved": "2021-07-01T00:00:00", "dateUpdated": "2024-09-16T20:36:38.524Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2023-1250
Vulnerability from cvelistv5
Published
2023-03-20 08:20
Modified
2024-08-02 05:40
Severity ?
EPSS score ?
Summary
Improper Input Validation vulnerability in OTRS AG OTRS (ACL modules), OTRS AG ((OTRS)) Community Edition (ACL modules) allows Local Execution of Code. When creating/importing an ACL it was possible to inject code that gets executed via manipulated comments and ACL-names
This issue affects OTRS: from 7.0.X before 7.0.42, from 8.0.X before 8.0.31; ((OTRS)) Community Edition: from 6.0.1 through 6.0.34.
References
Impacted products
Vendor | Product | Version | |||||
---|---|---|---|---|---|---|---|
▼ | OTRS AG | OTRS |
Version: 7.0.x Version: 8.0.x |
||||
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T05:40:59.714Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://otrs.com/release-notes/otrs-security-advisory-2023-02/" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "defaultStatus": "affected", "modules": [ "ACL" ], "product": "OTRS", "vendor": "OTRS AG", "versions": [ { "lessThan": "7.0.42", "status": "affected", "version": "7.0.x", "versionType": "Patch" }, { "lessThan": "8.0.31", "status": "affected", "version": "8.0.x", "versionType": "Patch" } ] }, { "defaultStatus": "affected", "modules": [ "ACL" ], "product": "((OTRS)) Community Edition", "vendor": "OTRS AG", "versions": [ { "lessThanOrEqual": "6.0.34", "status": "affected", "version": "6.0.1", "versionType": "All" } ] } ], "credits": [ { "lang": "en", "type": "finder", "user": "00000000-0000-4000-9000-000000000000", "value": "Special thanks to Tim P\u00fcttmanns for reporting these vulnerability." } ], "datePublic": "2023-03-20T07:00:00.000Z", "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "Improper Input Validation vulnerability in OTRS AG OTRS (ACL modules), OTRS AG ((OTRS)) Community Edition (ACL modules) allows Local Execution of Code. When creating/importing an ACL it was possible to inject code that gets executed via manipulated comments and ACL-names\u003cbr\u003e\u003cp\u003eThis issue affects OTRS: from 7.0.X before 7.0.42, from 8.0.X before 8.0.31; ((OTRS)) Community Edition: from 6.0.1 through 6.0.34.\u003c/p\u003e" } ], "value": "Improper Input Validation vulnerability in OTRS AG OTRS (ACL modules), OTRS AG ((OTRS)) Community Edition (ACL modules) allows Local Execution of Code. When creating/importing an ACL it was possible to inject code that gets executed via manipulated comments and ACL-names\nThis issue affects OTRS: from 7.0.X before 7.0.42, from 8.0.X before 8.0.31; ((OTRS)) Community Edition: from 6.0.1 through 6.0.34.\n\n" } ], "impacts": [ { "capecId": "CAPEC-549", "descriptions": [ { "lang": "en", "value": "CAPEC-549 Local Execution of Code" } ] } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "NONE", "baseScore": 7.4, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "HIGH", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:R/S:C/C:H/I:H/A:N", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-20", "description": "CWE-20 Improper Input Validation", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2023-03-20T08:20:39.331Z", "orgId": "2e1bf29f-dc29-4ed8-830c-7b9348b6f0e8", "shortName": "OTRS" }, "references": [ { "url": "https://otrs.com/release-notes/otrs-security-advisory-2023-02/" } ], "solutions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "\u003cp\u003eUpdate to OTRS 7.0.42, OTRS 8.0.31\u003c/p\u003e" } ], "value": "Update to OTRS 7.0.42, OTRS 8.0.31\n\n" } ], "source": { "advisory": "OSA-2023-02", "defect": [ "356", "2022121942001554" ], "discovery": "EXTERNAL" }, "title": "Code execution through ACL creation", "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "2e1bf29f-dc29-4ed8-830c-7b9348b6f0e8", "assignerShortName": "OTRS", "cveId": "CVE-2023-1250", "datePublished": "2023-03-20T08:20:39.331Z", "dateReserved": "2023-03-07T09:36:16.027Z", "dateUpdated": "2024-08-02T05:40:59.714Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2021-21443
Vulnerability from cvelistv5
Published
2021-07-26 04:25
Modified
2024-09-16 20:11
Severity ?
EPSS score ?
Summary
Agents are able to list customer user emails without required permissions in the bulk action screen. This issue affects: OTRS AG ((OTRS)) Community Edition: 6.0.x version 6.0.1 and later versions. OTRS AG OTRS: 7.0.x versions prior to 7.0.27.
References
Impacted products
Vendor | Product | Version | |||||
---|---|---|---|---|---|---|---|
▼ | OTRS AG | ((OTRS)) Community Edition |
Version: 6.0.1 < 6.0.x* |
||||
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T18:16:22.416Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://otrs.com/release-notes/otrs-security-advisory-2021-13/" }, { "name": "[debian-lts-announce] 20230831 [SECURITY] [DLA 3551-1] otrs2 security update", "tags": [ "mailing-list", "x_transferred" ], "url": "https://lists.debian.org/debian-lts-announce/2023/08/msg00040.html" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "((OTRS)) Community Edition", "vendor": "OTRS AG", "versions": [ { "lessThan": "6.0.x*", "status": "affected", "version": "6.0.1", "versionType": "custom" } ] }, { "product": "OTRS", "vendor": "OTRS AG", "versions": [ { "lessThan": "7.0.27", "status": "affected", "version": "7.0.x", "versionType": "custom" } ] } ], "datePublic": "2021-07-26T00:00:00", "descriptions": [ { "lang": "en", "value": "Agents are able to list customer user emails without required permissions in the bulk action screen. This issue affects: OTRS AG ((OTRS)) Community Edition: 6.0.x version 6.0.1 and later versions. OTRS AG OTRS: 7.0.x versions prior to 7.0.27." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 3.5, "baseSeverity": "LOW", "confidentialityImpact": "LOW", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:L/I:N/A:N", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-200", "description": "CWE-200 Information Exposure", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2023-08-31T02:06:56.804777", "orgId": "2e1bf29f-dc29-4ed8-830c-7b9348b6f0e8", "shortName": "OTRS" }, "references": [ { "url": "https://otrs.com/release-notes/otrs-security-advisory-2021-13/" }, { "name": "[debian-lts-announce] 20230831 [SECURITY] [DLA 3551-1] otrs2 security update", "tags": [ "mailing-list" ], "url": "https://lists.debian.org/debian-lts-announce/2023/08/msg00040.html" } ], "solutions": [ { "lang": "en", "value": "Update to OTRS 7.0.28." } ], "source": { "advisory": "OSA-2021-13", "defect": [ "2021062442001361" ], "discovery": "USER" }, "title": "Unautorized listing of the customer user emails", "x_generator": { "engine": "Vulnogram 0.0.9" } } }, "cveMetadata": { "assignerOrgId": "2e1bf29f-dc29-4ed8-830c-7b9348b6f0e8", "assignerShortName": "OTRS", "cveId": "CVE-2021-21443", "datePublished": "2021-07-26T04:25:40.249893Z", "dateReserved": "2020-12-29T00:00:00", "dateUpdated": "2024-09-16T20:11:31.892Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2024-23794
Vulnerability from cvelistv5
Published
2024-07-15 07:14
Modified
2024-08-01 23:13
Severity ?
EPSS score ?
Summary
An incorrect privilege assignment vulnerability in the inline editing functionality of OTRS can lead to privilege escalation. This flaw allows an agent with read-only permissions to gain full access to a ticket. This issue arises in very rare instances when an admin has previously enabled the setting 'RequiredLock' of 'AgentFrontend::Ticket::InlineEditing::Property###Watch' in the system configuration.This issue affects OTRS:
* 8.0.X
* 2023.X
* from 2024.X through 2024.4.x
References
Impacted products
{ "containers": { "adp": [ { "metrics": [ { "other": { "content": { "id": "CVE-2024-23794", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-07-16T14:46:31.889829Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-07-17T14:27:36.468Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" }, { "providerMetadata": { "dateUpdated": "2024-08-01T23:13:07.432Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://otrs.com/release-notes/otrs-security-advisory-2024-06/" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "modules": [ "inline editing" ], "product": "OTRS", "vendor": "OTRS AG", "versions": [ { "status": "affected", "version": "8.0.x" }, { "status": "affected", "version": "2023.x" }, { "lessThanOrEqual": "2024.4.x", "status": "affected", "version": "2024.x", "versionType": "Patch" } ] } ], "configurations": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "The sub setting RequiredLock of AgentFrontend::Ticket::InlineEditing::Property###Watch has to be activated by an administrator first and Ticket::Permission###1-OwnerCheck is enabled (default)\u003cbr\u003e\u003ch2\u003e\u003cbr\u003e\u003c/h2\u003e\u003cbr\u003e" } ], "value": "The sub setting RequiredLock of AgentFrontend::Ticket::InlineEditing::Property###Watch has to be activated by an administrator first and Ticket::Permission###1-OwnerCheck is enabled (default)\n\n" } ], "datePublic": "2024-07-15T07:00:00.000Z", "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "An incorrect privilege assignment vulnerability in the inline editing functionality of OTRS can lead to privilege escalation. This flaw allows an agent with read-only permissions to gain full access to a ticket. This issue arises in very rare instances when an admin has previously enabled the setting \u0027RequiredLock\u0027 of \u0027AgentFrontend::Ticket::InlineEditing::Property###Watch\u0027 in the system configuration.\u003cp\u003eThis issue affects OTRS:\u0026nbsp;\u003c/p\u003e\u003cul\u003e\u003cli\u003e8.0.X\u003c/li\u003e\u003cli\u003e2023.X\u003c/li\u003e\u003cli\u003efrom 2024.X through 2024.4.x\u003c/li\u003e\u003c/ul\u003e" } ], "value": "An incorrect privilege assignment vulnerability in the inline editing functionality of OTRS can lead to privilege escalation. This flaw allows an agent with read-only permissions to gain full access to a ticket. This issue arises in very rare instances when an admin has previously enabled the setting \u0027RequiredLock\u0027 of \u0027AgentFrontend::Ticket::InlineEditing::Property###Watch\u0027 in the system configuration.This issue affects OTRS:\u00a0\n\n * 8.0.X\n * 2023.X\n * from 2024.X through 2024.4.x\n\n" } ], "impacts": [ { "capecId": "CAPEC-233", "descriptions": [ { "lang": "en", "value": "CAPEC-233 Privilege Escalation" } ] } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.2, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "LOW", "privilegesRequired": "HIGH", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:U/C:H/I:L/A:N", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-266", "description": "CWE-266 Incorrect Privilege Assignment", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-07-15T10:41:01.694Z", "orgId": "2e1bf29f-dc29-4ed8-830c-7b9348b6f0e8", "shortName": "OTRS" }, "references": [ { "url": "https://otrs.com/release-notes/otrs-security-advisory-2024-06/" } ], "solutions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "Update to OTRS 2024.5.2\u003cbr\u003e" } ], "value": "Update to OTRS 2024.5.2\n" } ], "source": { "advisory": "OSA-2024-06", "defect": [ "Issue#2409", "Ticket#2024042342000433" ], "discovery": "USER" }, "title": "Agents are able to lock the ticket without the \"Owner\" permission", "workarounds": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "deactivate RequiredLock of AgentFrontend::Ticket::InlineEditing::Property###Watch or disable Ticket::Permission###1-OwnerCheck\u003cbr\u003e" } ], "value": "deactivate RequiredLock of AgentFrontend::Ticket::InlineEditing::Property###Watch or disable Ticket::Permission###1-OwnerCheck\n" } ], "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "2e1bf29f-dc29-4ed8-830c-7b9348b6f0e8", "assignerShortName": "OTRS", "cveId": "CVE-2024-23794", "datePublished": "2024-07-15T07:14:09.557Z", "dateReserved": "2024-01-22T10:32:00.705Z", "dateUpdated": "2024-08-01T23:13:07.432Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2020-1769
Vulnerability from cvelistv5
Published
2020-03-27 12:47
Modified
2024-09-17 01:27
Severity ?
EPSS score ?
Summary
In the login screens (in agent and customer interface), Username and Password fields use autocomplete, which might be considered as security issue. This issue affects: ((OTRS)) Community Edition: 5.0.41 and prior versions, 6.0.26 and prior versions. OTRS: 7.0.15 and prior versions.
References
Impacted products
Vendor | Product | Version | |||||
---|---|---|---|---|---|---|---|
▼ | OTRS AG | ((OTRS)) Community Edition |
Version: 5.0.x < Version: 6.0.x < |
||||
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T06:46:30.922Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://otrs.com/release-notes/otrs-security-advisory-2020-06/" }, { "name": "openSUSE-SU-2020:0551", "tags": [ "vendor-advisory", "x_transferred" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2020-04/msg00038.html" }, { "name": "openSUSE-SU-2020:1475", "tags": [ "vendor-advisory", "x_transferred" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00066.html" }, { "name": "openSUSE-SU-2020:1509", "tags": [ "vendor-advisory", "x_transferred" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00077.html" }, { "name": "[debian-lts-announce] 20230831 [SECURITY] [DLA 3551-1] otrs2 security update", "tags": [ "mailing-list", "x_transferred" ], "url": "https://lists.debian.org/debian-lts-announce/2023/08/msg00040.html" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "((OTRS)) Community Edition", "vendor": "OTRS AG", "versions": [ { "lessThanOrEqual": "5.0.41", "status": "affected", "version": "5.0.x", "versionType": "custom" }, { "lessThanOrEqual": "6.0.26", "status": "affected", "version": "6.0.x", "versionType": "custom" } ] }, { "product": "OTRS", "vendor": "OTRS AG", "versions": [ { "lessThanOrEqual": "7.0.15", "status": "affected", "version": "7.0.x", "versionType": "custom" } ] } ], "credits": [ { "lang": "en", "value": "Martin M\u00f8ller" } ], "datePublic": "2020-03-27T00:00:00", "descriptions": [ { "lang": "en", "value": "In the login screens (in agent and customer interface), Username and Password fields use autocomplete, which might be considered as security issue. This issue affects: ((OTRS)) Community Edition: 5.0.41 and prior versions, 6.0.26 and prior versions. OTRS: 7.0.15 and prior versions." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 3.5, "baseSeverity": "LOW", "confidentialityImpact": "LOW", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:L/I:N/A:N", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-16", "description": "CWE-16 Configuration", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2023-08-31T02:07:09.195145", "orgId": "2e1bf29f-dc29-4ed8-830c-7b9348b6f0e8", "shortName": "OTRS" }, "references": [ { "url": "https://otrs.com/release-notes/otrs-security-advisory-2020-06/" }, { "name": "openSUSE-SU-2020:0551", "tags": [ "vendor-advisory" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2020-04/msg00038.html" }, { "name": "openSUSE-SU-2020:1475", "tags": [ "vendor-advisory" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00066.html" }, { "name": "openSUSE-SU-2020:1509", "tags": [ "vendor-advisory" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00077.html" }, { "name": "[debian-lts-announce] 20230831 [SECURITY] [DLA 3551-1] otrs2 security update", "tags": [ "mailing-list" ], "url": "https://lists.debian.org/debian-lts-announce/2023/08/msg00040.html" } ], "solutions": [ { "lang": "en", "value": "Upgrade to OTRS 7.0.16, ((OTRS)) Community Edition 6.0.27, ((OTRS)) Community Edition 5.0.42.\n\nPatch for ((OTRS)) Community Edition 6: https://github.com/OTRS/otrs/commit/1b74e24582c946d02209acfc248d4ba451251f93\nPatch for ((OTRS)) Community Edition 5: https://github.com/OTRS/otrs/commit/7974ea582211c13730d223fc4dcdffa542af423f" } ], "source": { "advisory": "OSA-2020-06", "defect": [ "2020011042000836" ], "discovery": "EXTERNAL" }, "title": "Autocomplete in the form login screens", "x_generator": { "engine": "Vulnogram 0.0.9" } } }, "cveMetadata": { "assignerOrgId": "2e1bf29f-dc29-4ed8-830c-7b9348b6f0e8", "assignerShortName": "OTRS", "cveId": "CVE-2020-1769", "datePublished": "2020-03-27T12:47:49.378986Z", "dateReserved": "2019-11-29T00:00:00", "dateUpdated": "2024-09-17T01:27:02.769Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2022-0475
Vulnerability from cvelistv5
Published
2022-03-21 09:15
Modified
2024-09-17 02:01
Severity ?
EPSS score ?
Summary
Malicious translator is able to inject JavaScript code in few translatable strings (where HTML is allowed). The code could be executed in the Package manager. This issue affects: OTRS AG OTRS 7.0.x version: 7.0.32 and prior versions, 8.0.x version: 8.0.19 and prior versions.
References
▼ | URL | Tags |
---|---|---|
https://otrs.com/release-notes/otrs-security-advisory-2022-05/ | x_refsource_CONFIRM |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T23:32:45.539Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://otrs.com/release-notes/otrs-security-advisory-2022-05/" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "OTRS", "vendor": "OTRS AG", "versions": [ { "lessThanOrEqual": "7.0.32", "status": "affected", "version": "7.0.x", "versionType": "custom" }, { "lessThanOrEqual": "8.0.19", "status": "affected", "version": "8.0.x", "versionType": "custom" } ] } ], "credits": [ { "lang": "en", "value": "Special thanks to Bal\u00e1zs \u00dar for reporting these vulnerability." } ], "datePublic": "2022-03-21T00:00:00", "descriptions": [ { "lang": "en", "value": "Malicious translator is able to inject JavaScript code in few translatable strings (where HTML is allowed). The code could be executed in the Package manager. This issue affects: OTRS AG OTRS 7.0.x version: 7.0.32 and prior versions, 8.0.x version: 8.0.19 and prior versions." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 3.5, "baseSeverity": "LOW", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "HIGH", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:U/C:L/I:L/A:N", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-79", "description": "CWE-79 Cross-site Scripting (XSS)", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2022-03-21T09:15:38", "orgId": "2e1bf29f-dc29-4ed8-830c-7b9348b6f0e8", "shortName": "OTRS" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "https://otrs.com/release-notes/otrs-security-advisory-2022-05/" } ], "solutions": [ { "lang": "en", "value": "Update to OTRS 7.0.33 and OTRS 8.0.20." } ], "source": { "advisory": "OSA-2022-05", "defect": [ "2021120142000652" ], "discovery": "INTERNAL" }, "title": "Possible XSS attack via translation", "x_generator": { "engine": "Vulnogram 0.0.9" }, "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "security@otrs.com", "DATE_PUBLIC": "2022-03-21T09:00:00.000Z", "ID": "CVE-2022-0475", "STATE": "PUBLIC", "TITLE": "Possible XSS attack via translation" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "OTRS", "version": { "version_data": [ { "version_affected": "\u003c=", "version_name": "7.0.x", "version_value": "7.0.32" }, { "version_affected": "\u003c=", "version_name": "8.0.x", "version_value": "8.0.19" } ] } } ] }, "vendor_name": "OTRS AG" } ] } }, "credit": [ { "lang": "eng", "value": "Special thanks to Bal\u00e1zs \u00dar for reporting these vulnerability." } ], "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Malicious translator is able to inject JavaScript code in few translatable strings (where HTML is allowed). The code could be executed in the Package manager. This issue affects: OTRS AG OTRS 7.0.x version: 7.0.32 and prior versions, 8.0.x version: 8.0.19 and prior versions." } ] }, "generator": { "engine": "Vulnogram 0.0.9" }, "impact": { "cvss": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 3.5, "baseSeverity": "LOW", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "HIGH", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:U/C:L/I:L/A:N", "version": "3.1" } }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "CWE-79 Cross-site Scripting (XSS)" } ] } ] }, "references": { "reference_data": [ { "name": "https://otrs.com/release-notes/otrs-security-advisory-2022-05/", "refsource": "CONFIRM", "url": "https://otrs.com/release-notes/otrs-security-advisory-2022-05/" } ] }, "solution": [ { "lang": "en", "value": "Update to OTRS 7.0.33 and OTRS 8.0.20." } ], "source": { "advisory": "OSA-2022-05", "defect": [ "2021120142000652" ], "discovery": "INTERNAL" } } } }, "cveMetadata": { "assignerOrgId": "2e1bf29f-dc29-4ed8-830c-7b9348b6f0e8", "assignerShortName": "OTRS", "cveId": "CVE-2022-0475", "datePublished": "2022-03-21T09:15:38.679984Z", "dateReserved": "2022-02-02T00:00:00", "dateUpdated": "2024-09-17T02:01:40.604Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2022-39050
Vulnerability from cvelistv5
Published
2022-09-05 06:40
Modified
2024-09-16 19:24
Severity ?
EPSS score ?
Summary
An attacker who is logged into OTRS as an admin user may manipulate customer URL field to store JavaScript code to be run later by any other agent when clicking the customer URL link. Then the stored JavaScript is executed in the context of OTRS. The same issue applies for the usage of external data sources e.g. database or ldap
References
▼ | URL | Tags |
---|---|---|
https://otrs.com/release-notes/otrs-security-advisory-2022-11/ | x_refsource_CONFIRM |
Impacted products
Vendor | Product | Version | |||||
---|---|---|---|---|---|---|---|
▼ | OTRS AG | OTRS |
Version: 7.0.x < Version: 8.0.x < |
||||
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T11:10:32.447Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://otrs.com/release-notes/otrs-security-advisory-2022-11/" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "OTRS", "vendor": "OTRS AG", "versions": [ { "lessThanOrEqual": "7.0.36", "status": "affected", "version": "7.0.x", "versionType": "custom" }, { "lessThanOrEqual": "8.0.24", "status": "affected", "version": "8.0.x", "versionType": "custom" } ] }, { "product": "((OTRS)) Community Edition", "vendor": "OTRS AG", "versions": [ { "lessThan": "6.0.x*", "status": "affected", "version": "6.0.1", "versionType": "custom" } ] } ], "credits": [ { "lang": "en", "value": "Special thanks to Aleksey Solovev for reporting these vulnerability." } ], "datePublic": "2022-09-05T00:00:00", "descriptions": [ { "lang": "en", "value": "An attacker who is logged into OTRS as an admin user may manipulate customer URL field to store JavaScript code to be run later by any other agent when clicking the customer URL link. Then the stored JavaScript is executed in the context of OTRS. The same issue applies for the usage of external data sources e.g. database or ldap" } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 4.6, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:L/I:L/A:N", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-79", "description": "CWE-79 Cross-site Scripting (XSS)", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2022-09-05T06:40:11", "orgId": "2e1bf29f-dc29-4ed8-830c-7b9348b6f0e8", "shortName": "OTRS" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "https://otrs.com/release-notes/otrs-security-advisory-2022-11/" } ], "solutions": [ { "lang": "en", "value": "Update to OTRS 7.0.37 or OTRS 8.0.25." } ], "source": { "advisory": "OSA-2022-11", "defect": [ "2022062842001012" ], "discovery": "EXTERNAL" }, "title": "Possible XSS stored in customer information", "x_generator": { "engine": "Vulnogram 0.0.9" }, "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "security@otrs.com", "DATE_PUBLIC": "2022-09-05T07:00:00.000Z", "ID": "CVE-2022-39050", "STATE": "PUBLIC", "TITLE": "Possible XSS stored in customer information" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "OTRS", "version": { "version_data": [ { "version_affected": "\u003c=", "version_name": "7.0.x", "version_value": "7.0.36" }, { "version_affected": "\u003c=", "version_name": "8.0.x", "version_value": "8.0.24" } ] } }, { "product_name": "((OTRS)) Community Edition", "version": { "version_data": [ { "version_affected": "\u003e=", "version_name": "6.0.x", "version_value": "6.0.1" } ] } } ] }, "vendor_name": "OTRS AG" } ] } }, "credit": [ { "lang": "eng", "value": "Special thanks to Aleksey Solovev for reporting these vulnerability." } ], "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "An attacker who is logged into OTRS as an admin user may manipulate customer URL field to store JavaScript code to be run later by any other agent when clicking the customer URL link. Then the stored JavaScript is executed in the context of OTRS. The same issue applies for the usage of external data sources e.g. database or ldap" } ] }, "generator": { "engine": "Vulnogram 0.0.9" }, "impact": { "cvss": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 4.6, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:L/I:L/A:N", "version": "3.1" } }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "CWE-79 Cross-site Scripting (XSS)" } ] } ] }, "references": { "reference_data": [ { "name": "https://otrs.com/release-notes/otrs-security-advisory-2022-11/", "refsource": "CONFIRM", "url": "https://otrs.com/release-notes/otrs-security-advisory-2022-11/" } ] }, "solution": [ { "lang": "en", "value": "Update to OTRS 7.0.37 or OTRS 8.0.25." } ], "source": { "advisory": "OSA-2022-11", "defect": [ "2022062842001012" ], "discovery": "EXTERNAL" } } } }, "cveMetadata": { "assignerOrgId": "2e1bf29f-dc29-4ed8-830c-7b9348b6f0e8", "assignerShortName": "OTRS", "cveId": "CVE-2022-39050", "datePublished": "2022-09-05T06:40:11.972213Z", "dateReserved": "2022-08-31T00:00:00", "dateUpdated": "2024-09-16T19:24:11.199Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2024-23793
Vulnerability from cvelistv5
Published
2024-06-06 18:06
Modified
2024-08-01 23:13
Severity ?
EPSS score ?
Summary
The file upload feature in OTRS and ((OTRS)) Community Edition has a path traversal vulnerability. This issue permits authenticated agents or customer users to upload potentially harmful files to directories accessible by the web server, potentially leading to the execution of local code like Perl scripts.
This issue affects OTRS: from 7.0.X through 7.0.49, 8.0.X, 2023.X, from 2024.X through 2024.3.2; ((OTRS)) Community Edition: from 6.0.1 through 6.0.34.
References
Impacted products
Vendor | Product | Version | |||||
---|---|---|---|---|---|---|---|
▼ | OTRS AG | OTRS |
Version: 7.0.x Version: 8.0.x Version: 2023.x Version: 2024.x |
||||
|
{ "containers": { "adp": [ { "affected": [ { "cpes": [ "cpe:2.3:a:otrs:otrs:*:*:*:*:*:*:*:*" ], "defaultStatus": "affected", "product": "otrs", "vendor": "otrs", "versions": [ { "lessThan": "7.0.49", "status": "affected", "version": "7.0.x", "versionType": "custom" }, { "status": "affected", "version": "8.0.x" }, { "status": "affected", "version": "2023.x" }, { "lessThan": "2024.3.2", "status": "affected", "version": "2024.x", "versionType": "custom" } ] }, { "cpes": [ "cpe:2.3:a:otrs:otrs_community_edition:*:*:*:*:*:*:*:*" ], "defaultStatus": "affected", "product": "otrs_community_edition", "vendor": "otrs", "versions": [ { "lessThan": "6.0.34", "status": "affected", "version": "6.0.1", "versionType": "custom" } ] } ], "metrics": [ { "other": { "content": { "id": "CVE-2024-23793", "options": [ { "Exploitation": "poc" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-06-06T20:07:44.167335Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-06-06T20:22:49.508Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" }, { "providerMetadata": { "dateUpdated": "2024-08-01T23:13:07.327Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://otrs.com/release-notes/otrs-security-advisory-2024-05/" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "defaultStatus": "affected", "modules": [ "File Upload" ], "product": "OTRS", "vendor": "OTRS AG", "versions": [ { "lessThanOrEqual": "7.0.49", "status": "affected", "version": "7.0.x", "versionType": "Patch" }, { "status": "affected", "version": "8.0.x" }, { "status": "affected", "version": "2023.x" }, { "lessThanOrEqual": "2024.3.2", "status": "affected", "version": "2024.x", "versionType": "Patch" } ] }, { "defaultStatus": "affected", "product": "((OTRS)) Community Edition", "vendor": "OTRS AG", "versions": [ { "lessThanOrEqual": "6.0.34", "status": "affected", "version": "6.0.1", "versionType": "All" } ] } ], "datePublic": "2024-06-03T07:00:00.000Z", "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "The file upload feature in OTRS and ((OTRS)) Community Edition has a path traversal vulnerability. This issue permits authenticated agents or customer users to upload potentially harmful files to directories accessible by the web server, potentially leading to the execution of local code like Perl scripts.\u003cbr\u003e\u003cp\u003eThis issue affects OTRS: from 7.0.X through 7.0.49, 8.0.X, 2023.X, from 2024.X through 2024.3.2; ((OTRS)) Community Edition: from 6.0.1 through 6.0.34.\u003c/p\u003e" } ], "value": "The file upload feature in OTRS and ((OTRS)) Community Edition has a path traversal vulnerability. This issue permits authenticated agents or customer users to upload potentially harmful files to directories accessible by the web server, potentially leading to the execution of local code like Perl scripts.\nThis issue affects OTRS: from 7.0.X through 7.0.49, 8.0.X, 2023.X, from 2024.X through 2024.3.2; ((OTRS)) Community Edition: from 6.0.1 through 6.0.34.\n\n" } ], "impacts": [ { "capecId": "CAPEC-17", "descriptions": [ { "lang": "en", "value": "CAPEC-17 Using Malicious Files" } ] }, { "capecId": "CAPEC-549", "descriptions": [ { "lang": "en", "value": "CAPEC-549 Local Execution of Code" } ] } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "LOW", "baseScore": 6.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:H/A:L", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-22", "description": "CWE-22 Improper Limitation of a Pathname to a Restricted Directory (\u0027Path Traversal\u0027)", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-06-06T18:06:58.805Z", "orgId": "2e1bf29f-dc29-4ed8-830c-7b9348b6f0e8", "shortName": "OTRS" }, "references": [ { "url": "https://otrs.com/release-notes/otrs-security-advisory-2024-05/" } ], "solutions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "Update to OTRS\u0026nbsp;2024.4.3 or OTRS 7.0.50 (extended support only)\u003cbr\u003e" } ], "value": "Update to OTRS\u00a02024.4.3 or OTRS 7.0.50 (extended support only)\n" } ], "source": { "advisory": "OSA-2024-05", "defect": [ "Issue#2411" ], "discovery": "INTERNAL" }, "title": "Upload of files outside application directory", "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "2e1bf29f-dc29-4ed8-830c-7b9348b6f0e8", "assignerShortName": "OTRS", "cveId": "CVE-2024-23793", "datePublished": "2024-06-06T18:06:58.805Z", "dateReserved": "2024-01-22T10:32:00.704Z", "dateUpdated": "2024-08-01T23:13:07.327Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }