Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2017-15864

Опубликовано: 16 нояб. 2017
Источник: debian
EPSS Низкий

Описание

In the Agent Frontend in Open Ticket Request System (OTRS) 3.3.x through 3.3.18, with a crafted URL it is possible to gain information like database user and password.

Пакеты

ПакетСтатусВерсия исправленияРелизТип
otrs2fixed4.0.7-2package
otrs2fixed3.3.18-1+deb8u2jessiepackage

Примечания

  • https://www.otrs.com/security-advisory-2017-06-security-update-otrs-3-3/

  • https://github.com/OTRS/otrs/compare/3bc58ebeb9bdbe8107251a03cf7b9b8cfc515f53...80a0a9a138278d63a2621d146eb3c29e982aa2d5

  • Root cause for the issue is the recursive parsing handling in the old

  • DTL template engine that OTRS used up to OTRS 3.3. Starting with OTRS 4

  • OTRS switched to a new Template::Toolkit based engine which does not perform

  • recursive parsing and not affected by this issue.

EPSS

Процентиль: 65%
0.00501
Низкий

Связанные уязвимости

CVSS3: 8.8
ubuntu
около 8 лет назад

In the Agent Frontend in Open Ticket Request System (OTRS) 3.3.x through 3.3.18, with a crafted URL it is possible to gain information like database user and password.

CVSS3: 8.8
nvd
около 8 лет назад

In the Agent Frontend in Open Ticket Request System (OTRS) 3.3.x through 3.3.18, with a crafted URL it is possible to gain information like database user and password.

CVSS3: 8.8
github
больше 3 лет назад

In the Agent Frontend in Open Ticket Request System (OTRS) 3.3.x through 3.3.18, with a crafted URL it is possible to gain information like database user and password.

suse-cvrf
около 8 лет назад

Security update for otrs

EPSS

Процентиль: 65%
0.00501
Низкий