CVE-2019-16375
Published: 19 March 2020
An issue was discovered in Open Ticket Request System (OTRS) 7.0.x through 7.0.11, and Community Edition 5.0.x through 5.0.37 and 6.0.x through 6.0.22. An attacker who is logged in as an agent or customer user with appropriate permissions can create a carefully crafted string containing malicious JavaScript code as an article body. This malicious code is executed when an agent composes an answer to the original article.
Priority
CVSS 3 base score: 5.4
Status
Package | Release | Status |
---|---|---|
otrs2 Launchpad, Ubuntu, Debian |
Upstream |
Released
(6.0.23-1)
|
Ubuntu 20.10 (Groovy Gorilla) |
Not vulnerable
(6.0.23-2)
|
|
Ubuntu 20.04 LTS (Focal Fossa) |
Not vulnerable
(6.0.23-2)
|
|
Ubuntu 18.04 LTS (Bionic Beaver) |
Needs triage
|
|
Ubuntu 16.04 LTS (Xenial Xerus) |
Needs triage
|
|
Ubuntu 14.04 ESM (Trusty Tahr) |
Does not exist
|
References
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-16375
- https://community.otrs.com/security-advisory-2019-13-security-update-for-otrs-framework/
- https://github.com/OTRS/otrs/commit/aeb33d800716e2a6653597aa86314c4cbdadb678 (6.x)
- https://github.com/OTRS/otrs/commit/03ca8f396b1aa9933c212a63f52a9ea26c06e7da (5.x)
- NVD
- Launchpad
- Debian