October 12, 2020 — Please read carefully and check if the version of your ((OTRS)) Community Edition system is affected by this vulnerability.
Please send information regarding vulnerabilities in OTRS to: firstname.lastname@example.org
- pub 2048R/9C227C6B 2011-03-21 [expires at: 2020-11-16]
- uid OTRS Security Team <email@example.com>
- GPG Fingerprint E330 4608 DA6E 34B7 1551 C244 7F9E 44E9 9C22 7C6B
OSA-2020-14 Information disclosure (CVE-2020-11023, CVE-2020-11022)
This issue affects ((OTRS)) Community Edition 6.0.x. This issue affects OTRS 7.0.x. and OTRS 8.0.x.
OTRS uses jquery version 3.4.1, which is vulnerable to cross-site scripting (XSS). For more information, please read following article https://snyk.io/test/npm/jquery/3.4.1
This issue affects:
((OTRS)) Community Edition
6.0.x version 6.0.29 and prior versions.
7.0.x version 7.0.21 and prior versions. 8.0.x version 8.0.6 and prior versions.
This issue was discovered during an external security research.
Upgrade to OTRS 8.0.7, OTRS 7.0.22, ((OTRS)) Community Edition 6.0.30. Please also update the packages TimeAccounting, OTRSBusiness, OTRSCalendarResourcePlanning if installed to the latest version.
Patch for ((OTRS)) Community Edition 6: https://github.com/OTRS/otrs/commit/11d24c977747a1d7fd42d2cc81629ab8f1ed8291
This issue is being tracked as 2020041542003604.
- 2020-10-12: Initial Publication.
6.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L/E:U/RL:O/RC:C, 6.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:R