Release Notes

Security Advisory 2020-08

OTRS Group, the world’s leading provider of the OTRS service management suite, including the fully managed OTRS solution and the ITIL® V3-compliant IT service management software OTRS::ITSM.

March 27, 2020 — Please read carefully and check if the version of your ((OTRS)) Community Edition system is affected by this vulnerability.

Please send information regarding vulnerabilities in OTRS to: security@otrs.org

PGP Key

  • pub 2048R/9C227C6B 2011-03-21 [expires at: 2020-11-16]
  • uid OTRS Security Team <security@otrs.org>
  • GPG Fingerprint E330 4608 DA6E 34B7 1551 C244 7F9E 44E9 9C22 7C6B

OSA-2020-08 Possible XSS in Customer user address book (CVE-2020-1771)

Product Affected:

This issue affects ((OTRS)) Community Edition 6.0.x. This issue affects OTRS 7.0.x.

Problem:

Attacker is able craft an article with a link to the customer address book with malicious content (JavaScript). When agent opens the link, JavaScript code is executed due to the missing parameter encoding.

This issue affects:

((OTRS)) Community Edition:
6.0.26 and prior versions.

OTRS:
7.0.15 and prior versions.

This issue was discovered during an external security research.
This issue has been assigned CVE-2020-1771.

Solution:

Upgrade to OTRS 7.0.16, ((OTRS)) Community Edition 6.0.27

Patch for ((OTRS)) Community Edition 6: https://github.com/OTRS/otrs/commit/2576830053f70a3a9251558e55f34843dec61aa2

This issue is being tracked as 2020022642002875.

Modification History:

2020-03-27: Initial Publication.

Related Links:

CVE-2020-1771 at cve.mitre.org

CVSS Score:

4.6 ( CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:L/I:L/A:N)

Risk Level:

MEDIUM

Aknowledgement:

Christoph Wuetschner

Release Name:

Security Advisory 2020-08

Release Date:

27/03/2020

Security Advisory:

ID: OSA-2020-08
Date: 2020-03-27
Title: Possible XSS in Customer user address book
Severity: 4.6 MEDIUM
Product: OTRS 7.0.x, OTRS 6.0.x
Fixed in: OTRS 7.0.16, OTRS 6.0.27
FULL CVSS VECTOR: CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:L/I:L/A:N
References: CVE-2020-1771
Ticket#2020022642002875

Release Type:

security advisory

Archives