Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2019-16375

Опубликовано: 19 мар. 2020
Источник: debian
EPSS Низкий

Описание

An issue was discovered in Open Ticket Request System (OTRS) 7.0.x through 7.0.11, and Community Edition 5.0.x through 5.0.37 and 6.0.x through 6.0.22. An attacker who is logged in as an agent or customer user with appropriate permissions can create a carefully crafted string containing malicious JavaScript code as an article body. This malicious code is executed when an agent composes an answer to the original article.

Пакеты

ПакетСтатусВерсия исправленияРелизТип
otrs2fixed6.0.23-1package
otrs2ignoredstretchpackage
otrs2no-dsajessiepackage

Примечания

  • https://community.otrs.com/security-advisory-2019-13-security-update-for-otrs-framework/

  • https://github.com/OTRS/otrs/commit/aeb33d800716e2a6653597aa86314c4cbdadb678 (6.x)

  • https://github.com/OTRS/otrs/commit/03ca8f396b1aa9933c212a63f52a9ea26c06e7da (5.x)

EPSS

Процентиль: 70%
0.00647
Низкий

Связанные уязвимости

CVSS3: 5.4
ubuntu
почти 6 лет назад

An issue was discovered in Open Ticket Request System (OTRS) 7.0.x through 7.0.11, and Community Edition 5.0.x through 5.0.37 and 6.0.x through 6.0.22. An attacker who is logged in as an agent or customer user with appropriate permissions can create a carefully crafted string containing malicious JavaScript code as an article body. This malicious code is executed when an agent composes an answer to the original article.

CVSS3: 5.4
nvd
почти 6 лет назад

An issue was discovered in Open Ticket Request System (OTRS) 7.0.x through 7.0.11, and Community Edition 5.0.x through 5.0.37 and 6.0.x through 6.0.22. An attacker who is logged in as an agent or customer user with appropriate permissions can create a carefully crafted string containing malicious JavaScript code as an article body. This malicious code is executed when an agent composes an answer to the original article.

CVSS3: 5.4
github
больше 3 лет назад

An issue was discovered in Open Ticket Request System (OTRS) 7.0.x through 7.0.11, and Community Edition 5.0.x through 5.0.37 and 6.0.x through 6.0.22. An attacker who is logged in as an agent or customer user with appropriate permissions can create a carefully crafted string containing malicious JavaScript code as an article body. This malicious code is executed when an agent composes an answer to the original article.

suse-cvrf
больше 5 лет назад

Recommended update for otrs

suse-cvrf
почти 6 лет назад

Recommended update for otrs

EPSS

Процентиль: 70%
0.00647
Низкий