OTRS administrators can configure dynamic field and inject malicious JavaScript code in the error message of the regular expression check. When used in the agent interface, malicious code might be exectued in the browser. This issue affects: OTRS AG OTRS 7.0.x version: 7.0.31 and prior versions.
Metrics
Affected Vendors & Products
Advisories
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2022-15611 | OTRS administrators can configure dynamic field and inject malicious JavaScript code in the error message of the regular expression check. When used in the agent interface, malicious code might be exectued in the browser. This issue affects: OTRS AG OTRS 7.0.x version: 7.0.31 and prior versions. |
Fixes
Solution
Update to OTRS 7.0.32
Workaround
No workaround given by the vendor.
References
History
No history.
Projects
Sign in to view the affected projects.
Status: PUBLISHED
Assigner: OTRS
Published:
Updated: 2024-09-16T23:01:44.721Z
Reserved: 2022-02-02T00:00:00
Link: CVE-2022-0473
No data.
Status : Modified
Published: 2022-02-07T11:15:07.820
Modified: 2024-11-21T06:38:42.663
Link: CVE-2022-0473
No data.
OpenCVE Enrichment
No data.
Weaknesses
EUVD