First published: Mon Jun 17 2019(Updated: )
An issue was discovered in Open Ticket Request System (OTRS) 7.0.x through 7.0.7, Community Edition 6.0.x through 6.0.19, and Community Edition 5.0.x through 5.0.36. An attacker could send a malicious email to an OTRS system. If a logged-in agent user quotes it, the email could cause the browser to load external image resources.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
OTRS | >=5.0.0<=5.0.36 | |
OTRS | >=6.0.0<=6.0.19 | |
OTRS | >=7.0.0<=7.0.7 | |
Debian GNU/Linux | =8.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2019-12248 is considered a medium severity vulnerability that could allow an attacker to exploit the system through malicious email.
To fix CVE-2019-12248, it is recommended to update OTRS to version 7.0.8, 6.0.20, or 5.0.37 or apply the relevant patches provided by OTRS.
CVE-2019-12248 affects OTRS versions 5.0.0 through 5.0.36, 6.0.0 through 6.0.19, and 7.0.0 through 7.0.7.
CVE-2019-12248 describes an attack where a malicious email could cause issues when quoted by a logged-in agent user in OTRS.
A potential workaround for CVE-2019-12248 is to restrict email quoting functionality or limit the exposure of OTRS to untrusted email sources until a patch is applied.