Release Note
OTRS Security Advisory 2020-10
March 27, 2020 — Please read carefully and check if the version of your OTRS system is affected by this vulnerability.
Please send information regarding vulnerabilities in OTRS to: security@otrs.org
PGP Key
- pub 2048R/9C227C6B 2011-03-21
- uid OTRS Security Team <security@otrs.org>
- GPG Fingerprint E330 4608 DA6E 34B7 1551 C244 7F9E 44E9 9C22 7C6B
Security Advisory Details
- ID: OSA-2020-10
- Date: 2020-03-27
- Title: Session / Password token leak
- Severity: 7.3 HIGH
- Product: OTRS 7.0.x, OTRS 6.0.x, OTRS 5.0.x
- Fixed in: OTRS 7.0.16, OTRS 6.0.27, 5.0.42
- FULL CVSS VECTOR: CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:N
- References: CVE-2020-1773
OSA-2020-10 Session / Password / Password token leak (CVE-2020-1773)
Product Affected:
This issue affects ((OTRS)) Community Edition 5.0.x, 6.0.x. This issue affects OTRS 7.0.x.
Problem:
An attacker with the ability to generate session IDs or password reset tokens, either by being able to authenticate or by exploiting OSA-2020-09, may be able to predict other users session IDs, password reset tokens and automatically generated passwords.
This issue affects:
((OTRS)) Community Edition 5.0.41 version 6.0.26 and prior versions.
OTRS
7.0.15 and prior versions.
This issue was discovered during an external security research.
This issue has been assigned CVE-2020-1773.
Solution:
Upgrade to OTRS 7.0.16, ((OTRS)) Community Edition 6.0.27, 5.0.42
Patch for ((OTRS)) Community Edition 6:
https://github.com/OTRS/otrs/commit/ab253734bc211541309b9f8ea2b8b70389c4a64e
Patch for ((OTRS)) Community Edition 5:
https://github.com/OTRS/otrs/commit/ab253734bc211541309b9f8ea2b8b70389c4a64e
This issue is being tracked as 2020012742001563.
Modification History:
2020-03-27: Initial Publication.
Related Links:
CVE-2020-1773 at cve.mitre.org
CVSS Score:
7.3 ( CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:N)
Risk Level:
HIGH
Acknowledgements:
Fabian Henneke