First published: Sat Sep 17 2016(Updated: )
Multiple SQL injection vulnerabilities in the FAQ package 2.x before 2.3.6, 4.x before 4.0.5, and 5.x before 5.0.5 in Open Ticket Request System (OTRS) allow remote attackers to execute arbitrary SQL commands via crafted search parameters.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
OTRS | =2.0.1 | |
OTRS | =2.0.2 | |
OTRS | =2.0.3 | |
OTRS | =2.0.4 | |
OTRS | =2.0.5 | |
OTRS | =2.0.6 | |
OTRS | =2.0.7 | |
OTRS | =2.0.8 | |
OTRS | =2.1.0 | |
OTRS | =2.1.1 | |
OTRS | =2.1.2 | |
OTRS | =2.1.3 | |
OTRS | =2.1.4 | |
OTRS | =2.2.0 | |
OTRS | =2.2.1 | |
OTRS | =2.2.2 | |
OTRS | =2.2.3 | |
OTRS | =2.3.0 | |
OTRS | =2.3.1 | |
OTRS | =2.3.2 | |
OTRS | =2.3.3 | |
OTRS | =2.3.4 | |
OTRS | =4.0.0 | |
OTRS | =4.0.1 | |
OTRS | =4.0.2 | |
OTRS | =4.0.3 | |
OTRS | =5.0.0 | |
OTRS | =5.0.1 | |
OTRS | =5.0.2 | |
OTRS | =5.0.3 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2016-5843 describes multiple SQL injection vulnerabilities in the FAQ package of OTRS that allow remote attackers to execute arbitrary SQL commands via crafted search parameters.
CVE-2016-5843 affects OTRS FAQ package versions 2.x before 2.3.6, 4.x before 4.0.5, and 5.x before 5.0.5.
To fix CVE-2016-5843, upgrade the OTRS FAQ package to version 2.3.6 or later, 4.0.5 or later, or 5.0.5 or later.
Exploits associated with CVE-2016-5843 typically involve injecting malicious SQL queries through unsanitized search parameters.
The impact of CVE-2016-5843 is a potential remote SQL injection that can lead to unauthorized data manipulation or data leakage.