First published: Mon Oct 16 2023(Updated: )
The functions to fetch e-mail via POP3 or IMAP as well as sending e-mail via SMTP use OpenSSL for static SSL or TLS based communication. As the SSL_get_verify_result() function is not used the certificated is trusted always and it can not be ensured that the certificate satisfies all necessary security requirements. This could allow an attacker to use an invalid certificate to claim to be a trusted host, use expired certificates, or conduct other attacks that could be detected if the certificate is properly validated. This issue affects OTRS: from 7.0.X before 7.0.47, from 8.0.X before 8.0.37; ((OTRS)) Community Edition: from 6.0.X through 6.0.34.
Credit: security@otrs.com security@otrs.com
Affected Software | Affected Version | How to fix |
---|---|---|
Otrs Otrs | >=6.0.0<=6.0.34 | |
Otrs Otrs | >=7.0.0<7.0.47 | |
Otrs Otrs | >=8.0.0<8.0.37 |
Update to OTRS 7.0.47 or 8.0.37
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID is CVE-2023-5422.
The severity of CVE-2023-5422 is critical.
Versions 6.0.0 to 6.0.34 of Otrs Otrs, versions 7.0.0 to 7.0.47 of Otrs Otrs, and versions 8.0.0 to 8.0.37 of Otrs Otrs are affected by CVE-2023-5422.
The vulnerability CVE-2023-5422 can be exploited by bypassing certificate verification, leading to potential security risks in email communication.
To fix CVE-2023-5422, it is recommended to update to a fixed version of Otrs Otrs that addresses the SSL/TLS certificate verification issue and ensures secure email communication.