First published: Wed Aug 21 2019(Updated: )
An issue was discovered in Open Ticket Request System (OTRS) 7.0.x through 7.0.8, and Community Edition 5.0.x through 5.0.36 and 6.0.x through 6.0.19. An attacker who is logged into OTRS as an agent user with appropriate permissions can leverage OTRS notification tags in templates in order to disclose hashed user passwords.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
OTRS | >=5.0.0<=5.0.36 | |
OTRS | >=6.0.0<=6.0.19 | |
OTRS | >=7.0.0<=7.0.8 | |
Debian GNU/Linux | =8.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2019-13458 has been rated as a high severity vulnerability due to potential information disclosure risks.
To fix CVE-2019-13458, upgrade to OTRS versions 7.0.9 or later, or versions 6.0.20 or later.
CVE-2019-13458 affects OTRS versions 7.0.x through 7.0.8, 6.0.x through 6.0.19, and 5.0.x through 5.0.36.
CVE-2019-13458 requires an attacker to be logged into OTRS as an agent user, making it less likely to be exploited remotely.
The potential impacts of CVE-2019-13458 include unauthorized information disclosure due to improper handling of notification tags in templates.