First published: Mon Sep 05 2022(Updated: )
An attacker who is logged into OTRS as an admin user may manipulate customer URL field to store JavaScript code to be run later by any other agent when clicking the customer URL link. Then the stored JavaScript is executed in the context of OTRS. The same issue applies for the usage of external data sources e.g. database or ldap
Credit: security@otrs.com
Affected Software | Affected Version | How to fix |
---|---|---|
Otrs Otrs | >=6.0.0<=6.0.32 | |
Otrs Otrs | >=7.0.0<7.0.37 | |
Otrs Otrs | >=8.0.0<8.0.25 |
Update to OTRS 7.0.37 or OTRS 8.0.25.
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID of this issue is CVE-2022-39050.
The severity of CVE-2022-39050 is medium with a CVSS score of 4.8.
This vulnerability affects OTRS versions 6.0.0 to 6.0.32, 7.0.0 to 7.0.37, and 8.0.0 to 8.0.25.
An attacker who is logged into OTRS as an admin user can manipulate the customer URL field to store JavaScript code which will be executed when other agents click the customer URL link, allowing unauthorized code execution in the context of OTRS.
Apply the latest security update provided by OTRS to fix this vulnerability.