First published: Tue Nov 29 2005(Updated: )
Open Ticket Request System (OTRS) 1.0.0 through 1.3.2 and 2.0.0 through 2.0.3, when AttachmentDownloadType is set to inline, renders text/html e-mail attachments as HTML in the browser when the queue moderator attempts to download the attachment, which allows remote attackers to execute arbitrary web script or HTML. NOTE: this particular issue is referred to as XSS by some sources.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
OTRS | =2.0.3 | |
OTRS | =2.0.0 | |
OTRS | =1.3.2 | |
OTRS | =1.0.0 | |
OTRS | =2.0.2 | |
OTRS | =2.0.1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2005-3895 has a medium severity rating due to the potential for remote code execution.
To fix CVE-2005-3895, update OTRS to a version that does not use the inline attachment download type or apply the available security patches.
CVE-2005-3895 affects OTRS versions 1.0.0 to 1.3.2 and 2.0.0 to 2.0.3.
CVE-2005-3895 is a remote code execution vulnerability caused by improper handling of text/html email attachments.
Yes, an attacker can exploit CVE-2005-3895 by sending a specially crafted email with an HTML attachment.