An attacker with the ability to generate session IDs or password reset tokens, either by being able to authenticate or by exploiting OSA-2020-09, may be able to predict other users session IDs, password reset tokens and automatically generated passwords. This issue affects ((OTRS)) Community Edition: 5.0.41 and prior versions, 6.0.26 and prior versions. OTRS; 7.0.15 and prior versions.
Advisories
Source ID Title
Debian DLA Debian DLA DLA-3551-1 otrs2 security update
EUVD EUVD EUVD-2020-12599 An attacker with the ability to generate session IDs or password reset tokens, either by being able to authenticate or by exploiting OSA-2020-09, may be able to predict other users session IDs, password reset tokens and automatically generated passwords. This issue affects ((OTRS)) Community Edition: 5.0.41 and prior versions, 6.0.26 and prior versions. OTRS; 7.0.15 and prior versions.
Fixes

Solution

Upgrade to OTRS 7.0.16, ((OTRS)) Community Edition 6.0.27, 5.0.42 Patch for ((OTRS)) Community Edition 6: https://github.com/OTRS/otrs/commit/ab253734bc211541309b9f8ea2b8b70389c4a64e Patch for ((OTRS)) Community Edition 5: https://github.com/OTRS/otrs/commit/4955521af50238046847bce51ad9865950324f77


Workaround

No workaround given by the vendor.

History

No history.

cve-icon MITRE

Status: PUBLISHED

Assigner: OTRS

Published:

Updated: 2024-09-16T23:27:05.434Z

Reserved: 2019-11-29T00:00:00

Link: CVE-2020-1773

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Modified

Published: 2020-03-27T13:15:15.473

Modified: 2024-11-21T05:11:21.640

Link: CVE-2020-1773

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.