Upstream information

CVE-2020-1771 at MITRE

Description

Attacker is able craft an article with a link to the customer address book with malicious content (JavaScript). When agent opens the link, JavaScript code is executed due to the missing parameter encoding. This issue affects: ((OTRS)) Community Edition: 6.0.26 and prior versions. OTRS: 7.0.15 and prior versions.

SUSE information

Overall state of this security issue: Resolved

This issue is currently rated as having moderate severity.

CVSS v2 Scores
  National Vulnerability Database
Base Score 3.5
Vector AV:N/AC:M/Au:S/C:N/I:P/A:N
Access Vector Network
Access Complexity Medium
Authentication Single
Confidentiality Impact None
Integrity Impact Partial
Availability Impact None
CVSS v3 Scores
  National Vulnerability Database
Base Score 4.6
Vector CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:L/I:L/A:N
Attack Vector Network
Attack Complexity Low
Privileges Required Low
User Interaction Required
Scope Unchanged
Confidentiality Impact Low
Integrity Impact Low
Availability Impact None
CVSSv3 Version 3.1
SUSE Bugzilla entry: 1168030 [RESOLVED / FIXED]

SUSE Security Advisories:

List of released packages

Product(s) Fixed package version(s) References
SUSE Package Hub 15 SP1
  • otrs >= 6.0.29-bp151.3.6.2
  • otrs-doc >= 6.0.29-bp151.3.6.2
  • otrs-itsm >= 6.0.29-bp151.3.6.2
Patchnames:
openSUSE-2020-1475
openSUSE-2020-551
SUSE Package Hub 15 SP2
  • otrs >= 6.0.29-bp152.2.8.1
  • otrs-doc >= 6.0.29-bp152.2.8.1
  • otrs-itsm >= 6.0.29-bp152.2.8.1
Patchnames:
openSUSE-2020-1475
openSUSE-2020-1509
SUSE Package Hub 15
  • otrs >= 5.0.42-bp150.2.10.1
  • otrs-doc >= 5.0.42-bp150.2.10.1
  • otrs-itsm >= 5.0.42-bp150.2.10.1
Patchnames:
openSUSE-2020-551
openSUSE Leap 15.1
  • otrs >= 6.0.29-lp151.2.6.2
  • otrs-doc >= 6.0.29-lp151.2.6.2
  • otrs-itsm >= 6.0.29-lp151.2.6.2
Patchnames:
openSUSE-2020-1475
openSUSE-2020-551
openSUSE Leap 15.2
  • otrs >= 6.0.29-lp152.2.3.4
  • otrs-doc >= 6.0.29-lp152.2.3.4
  • otrs-itsm >= 6.0.29-lp152.2.3.4
Patchnames:
openSUSE-2020-1475


SUSE Timeline for this CVE

CVE page created: Fri Mar 27 19:43:23 2020
CVE page last modified: Sat Sep 7 13:30:48 2024