Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-fg8c-fxj5-qp3x

Опубликовано: 27 янв. 2025
Источник: github
Github: Не прошло ревью
CVSS3: 5.4

Описание

A vulnerability exists in OTRS and ((OTRS Community Edition)) that fail to set the HTTP response header X-Content-Type-Options to nosniff. An attacker could exploit this vulnerability by uploading or inserting content that would be treated as a different MIME type than intended.

This issue affects:

  • OTRS 7.0.X

  • OTRS 8.0.X

  • OTRS 2023.X

  • OTRS 2024.X

  • ((OTRS)) Community Edition: 6.0.x

Products based on the ((OTRS)) Community Edition also very likely to be affected

A vulnerability exists in OTRS and ((OTRS Community Edition)) that fail to set the HTTP response header X-Content-Type-Options to nosniff. An attacker could exploit this vulnerability by uploading or inserting content that would be treated as a different MIME type than intended.

This issue affects:

  • OTRS 7.0.X

  • OTRS 8.0.X

  • OTRS 2023.X

  • OTRS 2024.X

  • ((OTRS)) Community Edition: 6.0.x

Products based on the ((OTRS)) Community Edition also very likely to be affected

EPSS

Процентиль: 24%
0.00083
Низкий

5.4 Medium

CVSS3

Дефекты

CWE-20

Связанные уязвимости

CVSS3: 5.4
nvd
около 1 года назад

A vulnerability exists in OTRS and ((OTRS Community Edition)) that fail to set the HTTP response header X-Content-Type-Options to nosniff. An attacker could exploit this vulnerability by uploading or inserting content that would be treated as a different MIME type than intended. This issue affects: * OTRS 7.0.X * OTRS 8.0.X * OTRS 2023.X * OTRS 2024.X * ((OTRS)) Community Edition: 6.0.x Products based on the ((OTRS)) Community Edition also very likely to be affected

CVSS3: 5.4
fstec
больше 1 года назад

Уязвимость системы обработки заявок OTRS, связанная с некорректной обработкой заголовков HTTP-запросов, позволяющая нарушителю загружать произвольные файлы

EPSS

Процентиль: 24%
0.00083
Низкий

5.4 Medium

CVSS3

Дефекты

CWE-20