Attacker is able craft an article with a link to the customer address book with malicious content (JavaScript). When agent opens the link, JavaScript code is executed due to the missing parameter encoding. This issue affects: ((OTRS)) Community Edition: 6.0.26 and prior versions. OTRS: 7.0.15 and prior versions.
Metrics
Affected Vendors & Products
Advisories
Source | ID | Title |
---|---|---|
![]() |
DLA-3551-1 | otrs2 security update |
![]() |
EUVD-2020-12597 | Attacker is able craft an article with a link to the customer address book with malicious content (JavaScript). When agent opens the link, JavaScript code is executed due to the missing parameter encoding. This issue affects: ((OTRS)) Community Edition: 6.0.26 and prior versions. OTRS: 7.0.15 and prior versions. |
Fixes
Solution
Upgrade to OTRS 7.0.16, ((OTRS)) Community Edition 6.0.27 Patch for ((OTRS)) Community Edition 6: https://github.com/OTRS/otrs/commit/2576830053f70a3a9251558e55f34843dec61aa2
Workaround
No workaround given by the vendor.
References
History
No history.

Status: PUBLISHED
Assigner: OTRS
Published:
Updated: 2024-09-17T03:28:52.085Z
Reserved: 2019-11-29T00:00:00
Link: CVE-2020-1771

No data.

Status : Modified
Published: 2020-03-27T13:15:15.333
Modified: 2024-11-21T05:11:21.357
Link: CVE-2020-1771

No data.

No data.