First published: Fri Jan 10 2020(Updated: )
An improper control of parameters allows the spoofing of the from fields of the following screens: AgentTicketCompose, AgentTicketForward, AgentTicketBounce and AgentTicketEmailOutbound. This issue affects: ((OTRS)) Community Edition 5.0.x version 5.0.39 and prior versions; 6.0.x version 6.0.24 and prior versions. OTRS 7.0.x version 7.0.13 and prior versions.
Credit: security@otrs.com security@otrs.com
Affected Software | Affected Version | How to fix |
---|---|---|
OTRS | >=5.0.0<=5.0.39 | |
OTRS | >=6.0.0<=6.0.24 | |
OTRS | >=7.0.0<=7.0.13 | |
Debian Debian Linux | =8.0 | |
openSUSE Backports | =15.0 | |
openSUSE Backports | =15.0-sp1 | |
openSUSE Backports | =15.0-sp2 | |
openSUSE | =15.1 | |
openSUSE | =15.2 |
Upgrade to OTRS 7.0.14, ((OTRS)) Community Edition 6.0.25, ((OTRS)) Community Edition 5.0.40
Patch for ((OTRS)) Community Edition 6: https://github.com/OTRS/otrs/commit/d146d4997cbd6e1370669784c6a2ec8d64655252 Patch for ((OTRS)) Community Edition 5: https://github.com/OTRS/otrs/commit/874889b86abea4c01ceb1368a836b66694fae1c3
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2020-1765 is classified as a high-severity vulnerability due to its potential for email spoofing.
To mitigate CVE-2020-1765, users should upgrade to the latest version of OTRS that addresses this vulnerability.
CVE-2020-1765 affects OTRS Community Edition versions 5.0.39 and earlier, 6.0.24 and earlier, and 7.0.13 and earlier.
Yes, CVE-2020-1765 can be exploited remotely, allowing attackers to spoof email headers.
Systems running affected versions of OTRS, Debian Linux, and openSUSE Backports are vulnerable to CVE-2020-1765.