Executive Summary
Informations | |||
---|---|---|---|
Name | CVE-2005-3893 | First vendor Publication | 2005-11-29 |
Vendor | Cve | Last vendor Modification | 2024-11-21 |
Security-Database Scoring CVSS v3
Cvss vector : N/A | |||
---|---|---|---|
Overall CVSS Score | NA | ||
Base Score | NA | Environmental Score | NA |
impact SubScore | NA | Temporal Score | NA |
Exploitabality Sub Score | NA | ||
Calculate full CVSS 3.0 Vectors scores |
Security-Database Scoring CVSS v2
Cvss vector : (AV:N/AC:L/Au:N/C:P/I:P/A:P) | |||
---|---|---|---|
Cvss Base Score | 7.5 | Attack Range | Network |
Cvss Impact Score | 6.4 | Attack Complexity | Low |
Cvss Expoit Score | 10 | Authentication | None Required |
Calculate full CVSS 2.0 Vectors scores |
Detail
Multiple SQL injection vulnerabilities in index.pl in Open Ticket Request System (OTRS) 1.0.0 through 1.3.2 and 2.0.0 through 2.0.3 allow remote attackers to execute arbitrary SQL commands and bypass authentication via the (1) user parameter in the Login action, and remote authenticated users via the (2) TicketID and (3) ArticleID parameters of the AgentTicketPlain action. |
Original Source
Url : http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-3893 |
CPE : Common Platform Enumeration
Type | Description | Count |
---|---|---|
Application | 6 |
OpenVAS Exploits
Date | Description |
---|---|
2008-01-17 | Name : Debian Security Advisory DSA 973-1 (otrs) File : nvt/deb_973_1.nasl |
Open Source Vulnerability Database (OSVDB)
Id | Description |
---|---|
21065 | OTRS (Open Ticket Request System) AgentTicketPlain Action Multiple Parameter ... OTRS contains a flaw that may allow an attacker to carry out an SQL injection attack. The issue is due to the AgentTicketPlain function not properly sanitizing user-supplied input to the 'TicketID' and 'ArticleID' variables. This may allow an attacker to inject or manipulate SQL queries in the back-end database. |
21064 | OTRS (Open Ticket Request System) Login Function User Parameter SQL Injection OTRS contains a flaw that may allow an attacker to carry out an SQL injection attack. The issue is due to the login function not properly sanitizing user-supplied input to the 'user' variable. This may allow an attacker to inject or manipulate SQL queries in the back-end database. |
Nessus® Vulnerability Scanner
Date | Description |
---|---|
2006-10-14 | Name : The remote Debian host is missing a security-related update. File : debian_DSA-973.nasl - Type : ACT_GATHER_INFO |
Sources (Detail)
Alert History
Date | Informations |
---|---|
2024-11-28 23:21:35 |
|
2024-11-28 12:07:45 |
|
2021-05-04 12:03:22 |
|
2021-04-22 01:03:39 |
|
2020-05-23 00:17:02 |
|
2017-07-20 09:23:13 |
|
2016-10-18 12:01:50 |
|
2016-06-28 15:26:20 |
|
2016-04-26 13:59:34 |
|
2014-02-17 10:33:44 |
|
2013-05-11 11:35:48 |
|