Security Bulletin
This security bulletin contains one high risk vulnerability.
EUVDB-ID: #VU51862
Risk: High
CVSSv4.0: 6.3 [CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Amber]
CVE-ID: CVE-2019-9752
CWE-ID:
CWE-94 - Improper Control of Generation of Code ('Code Injection')
Exploit availability: No
DescriptionThe vulnerability allows a remote authenticated user to execute arbitrary code.
An issue was discovered in Open Ticket Request System (OTRS) 5.x before 5.0.34, 6.x before 6.0.16, and 7.x before 7.0.4. An attacker who is logged into OTRS as an agent or a customer user may upload a carefully crafted resource in order to cause execution of JavaScript in the context of OTRS. This is related to Content-type mishandling in Kernel/Modules/PictureUpload.pm.
MitigationInstall update from vendor's website.
Vulnerable software versionsOTRS: 5.0.0 - 6.0.13
CPE2.3https://lists.opensuse.org/opensuse-security-announce/2020-04/msg00038.html
https://lists.opensuse.org/opensuse-security-announce/2020-09/msg00066.html
https://lists.opensuse.org/opensuse-security-announce/2020-09/msg00077.html
https://community.otrs.com/security-advisory-2019-01-security-update-for-otrs-framework
https://lists.debian.org/debian-lts-announce/2019/03/msg00023.html
Q & A
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote authenticated user via the Internet.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.