Release Note

OTRS Security Advisory 2023-05

Please read carefully and check if the version of your OTRS system is affected by this vulnerability.

Please send information regarding vulnerabilities in OTRS to: security@otrs.org

PGP Key

  • pub 2048R/9C227C6B 2011-03-21
  • uid OTRS Security Team <security@otrs.org>
  • GPG Fingerprint E330 4608 DA6E 34B7 1551 C244 7F9E 44E9 9C22 7C6B

Security Advisory Details

  • D: OSA-2023-05
  • Date: 2023-07-24
  • Title: Code execution via System Configuration
  • Severity: 7.2 HIGH
  • Product: ((OTRS)) Community Edition 6.0.x, OTRS 7.0.x, OTRS 8.0.x
  • Fixed in: OTRS 7.0.45, OTRS 8.0.35
  • CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
  • References: CVE-2023-38056

OSA-2023-05 Code execution via System Configuration (CVE-2023-38056)

Improper Neutralization of commands allowed to be executed via OTRS System Configuration e.g. SchedulerCronTaskModule using UnitTests modules allows any authenticated attacker with admin privileges local execution of Code.

PRODUCT AFFECTED:

This issue affects

OTRS: from 7.0.X before 7.0.45, from 8.0.X before 8.0.35

((OTRS)) Community Edition: from 6.0.1 through 6.0.34

PROBLEM:

CWE-78 Improper Neutralization of Special Elements used in an OS Command (‘OS Command Injection’) CWE-78

Impact:

CAPEC-549 Local Execution of Code CAPEC-549

Product Status

Product Affected
OTRS AG OTRS » System Configuration, UnitTests

Default status is affected

from 7.0.x before 7.0.45

from 8.0.x before 8.0.35

OTRS AG ((OTRS)) Community Edition

Default status is affected

from 6.0.1 through 6.0.34

SOLUTION:

Update to OTRS 8.0.35 or OTRS 7.0.45

MODIFICATION HISTORY:

CVSS SCORE:

3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H

RISK LEVEL:

HIGH

ACKNOWLEDGEMENTS:

Special thanks to Tim Püttmanns for reporting these vulnerability.

Release Details

  • Release name:
    OTRS Security Advisory 2023-05
  • Release date:
    07/24/2023
  • Release type:
    security advisories