First published: Mon Aug 26 2024(Updated: )
Passwords of agents and customers are displayed in plain text in the OTRS admin log module if certain configurations regarding the authentication sources match and debugging for the authentication backend has been enabled. This issue affects: * OTRS from 7.0.X through 7.0.50 * OTRS 8.0.X * OTRS 2023.X * OTRS from 2024.X through 2024.5.X * ((OTRS)) Community Edition: 6.0.x Products based on the ((OTRS)) Community Edition also very likely to be affected
Credit: security@otrs.com
Affected Software | Affected Version | How to fix |
---|---|---|
OTRS | >=7.0.0<=7.0.50<=8.0.X<=2023.X>=2024.0<=2024.5 | |
<=6.0.X |
Update to OTRS 2024.6.x or OTRS 7.0.51
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-43444 is considered a high severity vulnerability due to the exposure of sensitive credentials in plain text.
To mitigate CVE-2024-43444, users should disable debugging for the authentication backend and ensure that logs do not contain sensitive information.
CVE-2024-43444 affects OTRS versions from 7.0.0 to 7.0.50, as well as specific configurations in versions 8.0.X and 2023.X.
Yes, CVE-2024-43444 also affects the OTRS Community Edition up to version 6.0.X.
CVE-2024-43444 exposes passwords of agents and customers in plain text in the OTRS admin log module.