Executive Summary
Summary | |
---|---|
Title | New OTRS packages fix several vulnerabilities |
Informations | |||
---|---|---|---|
Name | DSA-973 | First vendor Publication | 2006-02-15 |
Vendor | Debian | Last vendor Modification | 2006-02-15 |
Severity (Vendor) | N/A | Revision | 1 |
Security-Database Scoring CVSS v3
Cvss vector : N/A | |||
---|---|---|---|
Overall CVSS Score | NA | ||
Base Score | NA | Environmental Score | NA |
impact SubScore | NA | Temporal Score | NA |
Exploitabality Sub Score | NA | ||
Calculate full CVSS 3.0 Vectors scores |
Security-Database Scoring CVSS v2
Cvss vector : (AV:N/AC:L/Au:N/C:P/I:P/A:P) | |||
---|---|---|---|
Cvss Base Score | 7.5 | Attack Range | Network |
Cvss Impact Score | 6.4 | Attack Complexity | Low |
Cvss Expoit Score | 10 | Authentication | None Required |
Calculate full CVSS 2.0 Vectors scores |
Detail
Several vulnerabilities have been discovered in otrs, the Open Ticket Request System, that can be exploited remotely. The Common vulnerabilities and Exposures Project identifies the following problems: CVE-2005-3893 Multiple SQL injection vulnerabilities allow remote attackers to execute arbitrary SQL commands and bypass authentication. CVE-2005-3894 Multiple cross-site scripting vulnerabilities allow remote authenticated users to inject arbitrary web script or HTML. CVE-2005-3895 Internally attached text/html mails are rendered as HTML when the queue moderator attempts to download the attachment, which allows remote attackers to execute arbitrary web script or HTML. the old stable distribution (woody) does not contain OTRS packages. For the stable distribution (sarge) these problems have been fixed in version 1.3.2p01-6. For the unstable distribution (sid) these problems have been fixed in version 2.0.4p01-1. We recommend that you upgrade your otrs package. |
Original Source
Url : http://www.debian.org/security/2006/dsa-973 |
CPE : Common Platform Enumeration
Type | Description | Count |
---|---|---|
Application | 6 |
OpenVAS Exploits
Date | Description |
---|---|
2008-01-17 | Name : Debian Security Advisory DSA 973-1 (otrs) File : nvt/deb_973_1.nasl |
Open Source Vulnerability Database (OSVDB)
Id | Description |
---|---|
21067 | OTRS (Open Ticket Request System) index.pl Multiple Parameter XSS OTRS contains a flaw that allows a remote cross site scripting attack. This flaw exists because the application does not validate the "QueueID" or "Action" variables upon submission to the index.pl script. This could allow a user to create a specially crafted URL that would execute arbitrary code in a user's browser within the trust relationship between the browser and the server, leading to a loss of integrity. |
21066 | OTRS (Open Ticket Request System) Email Attachment XSS OTRS contains a flaw that allows a remote cross site scripting attack. This flaw exists because the application does not validate HTML attachments. This could allow an attacker to create a specially crafted file that would execute arbitrary code in a user's browser within the trust relationship between the browser and the server, leading to a loss of integrity. |
21065 | OTRS (Open Ticket Request System) AgentTicketPlain Action Multiple Parameter ... OTRS contains a flaw that may allow an attacker to carry out an SQL injection attack. The issue is due to the AgentTicketPlain function not properly sanitizing user-supplied input to the 'TicketID' and 'ArticleID' variables. This may allow an attacker to inject or manipulate SQL queries in the back-end database. |
21064 | OTRS (Open Ticket Request System) Login Function User Parameter SQL Injection OTRS contains a flaw that may allow an attacker to carry out an SQL injection attack. The issue is due to the login function not properly sanitizing user-supplied input to the 'user' variable. This may allow an attacker to inject or manipulate SQL queries in the back-end database. |
Nessus® Vulnerability Scanner
Date | Description |
---|---|
2006-10-14 | Name : The remote Debian host is missing a security-related update. File : debian_DSA-973.nasl - Type : ACT_GATHER_INFO |
Alert History
Date | Informations |
---|---|
2014-02-17 11:34:55 |
|