First published: Wed Apr 02 2014(Updated: )
Cross-site scripting (XSS) vulnerability in Open Ticket Request System (OTRS) 3.1.x before 3.1.21, 3.2.x before 3.2.16, and 3.3.x before 3.3.6 allows remote authenticated users to inject arbitrary web script or HTML via vectors related to dynamic fields.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
OTRS | =3.2.0 | |
OTRS | =3.2.0-beta1 | |
OTRS | =3.2.0-beta2 | |
OTRS | =3.2.0-beta3 | |
OTRS | =3.2.0-beta4 | |
OTRS | =3.2.0-beta5 | |
OTRS | =3.2.0-rc1 | |
OTRS | =3.2.1 | |
OTRS | =3.2.2 | |
OTRS | =3.2.3 | |
OTRS | =3.2.4 | |
OTRS | =3.2.5 | |
OTRS | =3.2.6 | |
OTRS | =3.2.7 | |
OTRS | =3.2.8 | |
OTRS | =3.2.9 | |
OTRS | =3.2.10 | |
OTRS | =3.2.11 | |
OTRS | =3.2.12 | |
OTRS | =3.2.13 | |
OTRS | =3.2.14 | |
OTRS | =3.2.15 | |
OTRS | =3.3.0 | |
OTRS | =3.3.0-beta1 | |
OTRS | =3.3.0-beta2 | |
OTRS | =3.3.0-beta3 | |
OTRS | =3.3.0-beta4 | |
OTRS | =3.3.0-beta5 | |
OTRS | =3.3.0-rc1 | |
OTRS | =3.3.1 | |
OTRS | =3.3.2 | |
OTRS | =3.3.3 | |
OTRS | =3.3.4 | |
OTRS | =3.3.5 | |
OTRS | =3.1.0 | |
OTRS | =3.1.1 | |
OTRS | =3.1.2 | |
OTRS | =3.1.3 | |
OTRS | =3.1.4 | |
OTRS | =3.1.5 | |
OTRS | =3.1.6 | |
OTRS | =3.1.7 | |
OTRS | =3.1.8 | |
OTRS | =3.1.9 | |
OTRS | =3.1.10 | |
OTRS | =3.1.11 | |
OTRS | =3.1.13 | |
OTRS | =3.1.14 | |
OTRS | =3.1.15 | |
OTRS | =3.1.16 | |
OTRS | =3.1.17 | |
OTRS | =3.1.18 | |
OTRS | =3.1.19 | |
OTRS | =3.1.20 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2014-2553 has a medium severity rating, allowing potential attackers to exploit XSS vulnerabilities.
To fix CVE-2014-2553, upgrade OTRS to versions 3.1.21, 3.2.16, or 3.3.6 or later.
CVE-2014-2553 affects OTRS versions 3.1.x prior to 3.1.21, 3.2.x prior to 3.2.16, and 3.3.x prior to 3.3.6.
CVE-2014-2553 can facilitate cross-site scripting (XSS) attacks, allowing attackers to inject arbitrary web scripts or HTML.
There are no effective workarounds for CVE-2014-2553; the recommended action is to apply the necessary software updates to mitigate the risk.