Name | CVE-2020-1771 |
Description | Attacker is able craft an article with a link to the customer address book with malicious content (JavaScript). When agent opens the link, JavaScript code is executed due to the missing parameter encoding. This issue affects: ((OTRS)) Community Edition: 6.0.26 and prior versions. OTRS: 7.0.15 and prior versions. |
Source | CVE (at NVD; CERT, LWN, oss-sec, fulldisc, Red Hat, Ubuntu, Gentoo, SUSE bugzilla/CVE, GitHub advisories/code/issues, web search, more) |
References | DLA-3551-1 |
Vulnerable and fixed packages
The table below lists information on source packages.
Source Package | Release | Version | Status |
---|
otrs2 (PTS) | bullseye/non-free | 6.0.32-6 | fixed |
The information below is based on the following data on fixed versions.
Package | Type | Release | Fixed Version | Urgency | Origin | Debian Bugs |
---|
otrs2 | source | jessie | (not affected) | | | |
otrs2 | source | buster | 6.0.16-2+deb10u1 | | DLA-3551-1 | |
otrs2 | source | (unstable) | 6.0.27-1 | | | |
Notes
[stretch] - otrs2 <ignored> (Non-free not supported)
[jessie] - otrs2 <not-affected> (Vulnerable code introduced in later version)
https://otrs.com/release-notes/otrs-security-advisory-2020-08/
Fixed in 7.0.16, 6.0.27
https://github.com/OTRS/otrs/commit/2576830053f70a3a9251558e55f34843dec61aa2