June 06, 2017 — Please read carefully and check if the version of your OTRS system is affected by this vulnerability.
Please send information regarding vulnerabilities in OTRS to: security@otrs.org
Security Advisory Details
- ID: OSA-2017-02
- Date: 2017-06-06
- Title: Reflected cross-site scripting in OTRS
- Severity: 3.4 low
- Product: OTRS 5.0.x, OTRS 4.0.x, OTRS 3.3.x
- Fixed in: OTRS 5.0.20, OTRS 4.0.24, OTRS 3.3.17
- FULL CVSS v3 VECTOR: AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:N/E:U/RL:O/RC:U
- References: –
Vulnerability Description
This advisory covers vulnerabilities discovered in the OTRS framework.
Information Disclosure
Certain pages of the OTRS interface are affected by a cross-site scripting vulnerability. It fails to sanitize user input to sufficiently remove HTML tags such as JavaScript from user input. A remote attacker can craft a malicious link containing JavaScript or other arbitrary HTML that will be executed in another user’s browser in the context of their OTRS session.
Affected by this vulnerability are all releases of OTRS 5.0.x up to and including 5.0.19, OTRS 4.0.x up to and including 4.0.23 and OTRS 3.3.x up to and including 3.3.16.
This vulnerability is fixed in the latest versions of OTRS, and it is recommended to upgrade to the latest patch level.
Fixed releases can be found at:
https://community.otrs.com/category/release-and-security-notes-en/
Thanks to Alexandre Vezina for discovering and reporting this issue.