Page 18 of 149 results (0.006 seconds)

CVSS: 4.3EPSS: 0%CPEs: 5EXPL: 0

In Open Ticket Request System (OTRS) 4.0.x before 4.0.32, 5.0.x before 5.0.30, and 6.0.x before 6.0.11, an attacker could send a malicious email to an OTRS system. If a logged in user opens it, the email could cause the browser to load external image or CSS resources. En Open Ticket Request System (OTRS) en versiones 4.0.x anteriores a la 4.0.32, versiones 5.0.x anteriores a la 5.0.30 y versiones 6.0.x anteriores a la 6.0.11, un atacante podría enviar un email malicioso a un sistema OTRS. Si un usuario que haya iniciado sesión lo abre, el email podría provocar que el navegador cargue una imagen externa o recursos CSS. • https://community.otrs.com/security-advisory-2018-05-security-update-for-otrs-framework https://github.com/OTRS/otrs/commit/09e80c7752b0d9080688e4597c7495dd109e0963 https://github.com/OTRS/otrs/commit/a808859a75c59ae3b7568f5cc4708c53462aa4c7 https://github.com/OTRS/otrs/commit/baa92df09145b8ae2702a3a0e85d8ba55ec96302 https://lists.debian.org/debian-lts-announce/2018/09/msg00033.html https://www.debian.org/security/2018/dsa-4317 •

CVSS: 8.8EPSS: 0%CPEs: 5EXPL: 0

An issue was discovered in Open Ticket Request System (OTRS) 6.0.x through 6.0.9, 5.0.x through 5.0.28, and 4.0.x through 4.0.30. An attacker who is logged into OTRS as an agent may escalate their privileges by accessing a specially crafted URL. Se ha descubierto un problema en Open Ticket Request System (OTRS), en versiones 6.0.x anteriores a la 6.0.9, versiones 5.0.x anteriores a la 5.0.28 y versiones 4.0.x anteriores a la 4.0.30. Un atacante que haya iniciado sesión en OTRS como agente podría escalar sus privilegios accediendo a una URL especialmente manipulada. • https://community.otrs.com/security-advisory-2018-03-security-update-for-otrs-framework/?lang=de https://lists.debian.org/debian-lts-announce/2018/08/msg00021.html https://www.debian.org/security/2018/dsa-4317 •

CVSS: 4.3EPSS: 0%CPEs: 1EXPL: 0

An issue was discovered in OTRS 6.0.x before 6.0.7. An attacker who is logged into OTRS as a customer can use the ticket overview screen to disclose internal article information of their customer tickets. Se ha descubierto un problema en OTRS, en versiones 6.0.x anteriores a la 6.0.7. Un atacante que haya iniciado sesión en OTRS como cliente puede emplear la pantalla de visualización de tickets para revelar información interna de artículos de sus tickets de cliente. • https://community.otrs.com/security-advisory-2018-01-security-update-for-otrs-framework • CWE-200: Exposure of Sensitive Information to an Unauthorized Actor •

CVSS: 9.0EPSS: 0%CPEs: 3EXPL: 1

In the Admin Package Manager in Open Ticket Request System (OTRS) 5.0.0 through 5.0.24 and 6.0.0 through 6.0.1, authenticated admins are able to exploit a Blind Remote Code Execution vulnerability by loading a crafted opm file with an embedded CodeInstall element to execute a command on the server during package installation. NOTE: the vendor disputes this issue stating "the behaviour is as designed and needed for different packages to be installed", "there is a security warning if the package is not verified by OTRS Group", and "there is the possibility and responsibility of an admin to check packages before installation which is possible as they are not binary. ** EN DISPUTA ** En el Admin Package Manager en Open Ticket Request System (OTRS) 5.0.0 hasta 5.0.24 y 6.0.0 hasta 6.0.1, los administradores autenticados pueden explotar una vulnerabilidad de ejecución remota de código ciega cargando un archivo opm manipulado mediante un elemento CodeInstall para ejecutar un comando en el servidor mediante la instalación de paquetes. NOTA: el fabricante discute este problema argumentando que "el comportamiento se ha diseñado así y es necesario para que diferentes paquetes sean instalados", "hay una advertencia de seguridad si el paquete no está verificado por OTRS Group" y "es posible y la responsabilidad de un administrador comprobar los paquetes antes de instalarlos, lo que es posible porque no son binarios". OTRS versions 5.0.0 through 5.0.24 and 6.0.0 through 6.0.1 suffer from remote code execution vulnerabilities. • https://0day.today/exploit/29938 • CWE-434: Unrestricted Upload of File with Dangerous Type •

CVSS: 8.8EPSS: 0%CPEs: 6EXPL: 0

Open Ticket Request System (OTRS) 4.0.x before 4.0.28, 5.0.x before 5.0.26, and 6.0.x before 6.0.3, when cookie support is disabled, might allow remote attackers to hijack web sessions and consequently gain privileges via a crafted email. Open Ticket Request System (OTRS) en versiones 4.0.x anteriores a la 4.0.28, 5.0.x anteriores a la 5.0.26 y 6.0.x anteriores a la 6.0.3, cuando el soporte de cookies está desactivado, podría permitir a los atacantes remotos secuestrar las sesiones web y ganar privilegios en consecuencia mediante un email manipulado. • https://github.com/OTRS/otrs/commit/26707eaaa791648e6c7ad6aeaa27efd70e7c66eb https://github.com/OTRS/otrs/commit/36e3be99cfe8a9e09afa1b75fdc39f3e28f561fc https://github.com/OTRS/otrs/commit/720c73fbf53e476ca7dfdf2ae1d4d3d2aad2b953 https://lists.debian.org/debian-lts-announce/2017/12/msg00018.html https://www.debian.org/security/2017/dsa-4069 https://www.otrs.com/security-advisory-2017-10-security-update-otrs-framework • CWE-200: Exposure of Sensitive Information to an Unauthorized Actor •