First published: Tue Dec 19 2017(Updated: )
Open Ticket Request System (OTRS) 4.0.x before 4.0.28, 5.0.x before 5.0.26, and 6.0.x before 6.0.3, when cookie support is disabled, might allow remote attackers to hijack web sessions and consequently gain privileges via a crafted email.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
debian/otrs2 | 6.0.16-2 6.0.16-2+deb10u1 6.0.32-6 | |
OTRS | >=4.0.0<4.0.28 | |
OTRS | >=5.0.0<5.0.26 | |
OTRS | >=6.0.0<6.0.3 | |
Debian GNU/Linux | =7.0 | |
Debian GNU/Linux | =8.0 | |
Debian GNU/Linux | =9.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2017-17476 is considered a high severity vulnerability due to its potential for remote session hijacking.
To fix CVE-2017-17476, upgrade to OTRS version 4.0.28, 5.0.26, or 6.0.3 or later.
CVE-2017-17476 affects OTRS versions prior to 4.0.28, 5.0.26, and 6.0.3.
Yes, CVE-2017-17476 can allow remote attackers to gain elevated privileges through session hijacking.
Yes, CVE-2017-17476 exploits the vulnerability when cookie support is disabled.