7.5
CWE
155
Advisory Published
Updated

CVE-2020-1772: Information Disclosure

First published: Fri Mar 27 2020(Updated: )

It's possible to craft Lost Password requests with wildcards in the Token value, which allows attacker to retrieve valid Token(s), generated by users which already requested new passwords. This issue affects: ((OTRS)) Community Edition 5.0.41 and prior versions, 6.0.26 and prior versions. OTRS: 7.0.15 and prior versions.

Credit: security@otrs.com security@otrs.com

Affected SoftwareAffected VersionHow to fix
Otrs Otrs>=5.0.0<=5.0.41
Otrs Otrs>=6.0.0<=6.0.26
Otrs Otrs>=7.0.0<=7.0.15
openSUSE Backports SLE=15.0
openSUSE Backports SLE=15.0-sp1
openSUSE Backports SLE=15.0-sp2
openSUSE Leap=15.1
openSUSE Leap=15.2
Debian Debian Linux=8.0

Remedy

Upgrade to OTRS 7.0.16, ((OTRS)) Community Edition 6.0.27, 5.0.42 Patch for ((OTRS)) Community Edition 6: https://github.com/OTRS/otrs/commit/c0255365d5c455272b2b9e7bb1f6c96c3fce441b Patch for ((OTRS)) Community Edition 5: https://github.com/OTRS/otrs/commit/96cc7826d6ce260204ff629fc968edd2787b7f6b

Never miss a vulnerability like this again

Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.

Frequently Asked Questions

  • What is CVE-2020-1772?

    CVE-2020-1772 is a vulnerability that allows attackers to retrieve valid Tokens used for Lost Password requests in ((OTRS)) Community Edition versions 5.0.41 and prior, 6.0.26 and prior, and 7.0.15 and prior.

  • What is the severity of CVE-2020-1772?

    CVE-2020-1772 has a severity rating of 7.5 (High).

  • Which software versions are affected by CVE-2020-1772?

    The affected software versions include ((OTRS)) Community Edition 5.0.41 and prior, 6.0.26 and prior, and 7.0.15 and prior.

  • How can an attacker exploit CVE-2020-1772?

    An attacker can exploit CVE-2020-1772 by crafting Lost Password requests with wildcards in the Token value to retrieve valid Tokens generated by other users.

  • Are there any fixes available for CVE-2020-1772?

    Yes, fixes for CVE-2020-1772 have been released. It is recommended to update ((OTRS)) Community Edition to a version that is not affected.

Contact

SecAlerts Pty Ltd.
132 Wickham Terrace
Fortitude Valley,
QLD 4006, Australia
info@secalerts.co
By using SecAlerts services, you agree to our services end-user license agreement. This website is safeguarded by reCAPTCHA and governed by the Google Privacy Policy and Terms of Service. All names, logos, and brands of products are owned by their respective owners, and any usage of these names, logos, and brands for identification purposes only does not imply endorsement. If you possess any content that requires removal, please get in touch with us.
© 2024 SecAlerts Pty Ltd.
ABN: 70 645 966 203, ACN: 645 966 203