First published: Mon Jan 27 2025(Updated: )
A vulnerability exists in OTRS and ((OTRS Community Edition)) that fail to set the HTTP response header X-Content-Type-Options to nosniff. An attacker could exploit this vulnerability by uploading or inserting content that would be treated as a different MIME type than intended. This issue affects: * OTRS 7.0.X * OTRS 8.0.X * OTRS 2023.X * OTRS 2024.X * ((OTRS)) Community Edition: 6.0.x Products based on the ((OTRS)) Community Edition also very likely to be affected
Credit: security@otrs.com
Affected Software | Affected Version | How to fix |
---|---|---|
OTRS | >=7.0.0<8.0.0>=8.0.0<2023.0>=2023.0<2024.0 | |
OTRS | >=6.0.0<7.0.0 |
Update to OTRS 2025.1.x. Please note that there will be no OTRS 7 patches
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-43445 is classified with a medium severity due to the potential for an attacker to exploit MIME type confusion.
To fix CVE-2024-43445, update OTRS or OTRS Community Edition to the latest version where the X-Content-Type-Options header is correctly configured.
CVE-2024-43445 affects OTRS versions 7.0.0 to 8.0.0 and 2023.0, as well as OTRS Community Edition versions 6.0.0 to 7.0.0.
An attacker exploiting CVE-2024-43445 can upload or insert content that is incorrectly handled as a different MIME type, potentially leading to various attacks.
Currently, the best approach for CVE-2024-43445 is to upgrade to a patched version, as no specific workaround is recommended.