Release Note
OTRS Security Advisory 2023-05
Please read carefully and check if the version of your OTRS system is affected by this vulnerability.
Please send information regarding vulnerabilities in OTRS to: security@otrs.org
PGP Key
- pub 2048R/9C227C6B 2011-03-21
- uid OTRS Security Team <security@otrs.org>
- GPG Fingerprint E330 4608 DA6E 34B7 1551 C244 7F9E 44E9 9C22 7C6B
Security Advisory Details
- D: OSA-2023-05
- Date: 2023-07-24
- Title: Code execution via System Configuration
- Severity: 7.2 HIGH
- Product: ((OTRS)) Community Edition 6.0.x, OTRS 7.0.x, OTRS 8.0.x
- Fixed in: OTRS 7.0.45, OTRS 8.0.35
- CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
- References: CVE-2023-38056
OSA-2023-05 Code execution via System Configuration (CVE-2023-38056)
Improper Neutralization of commands allowed to be executed via OTRS System Configuration e.g. SchedulerCronTaskModule using UnitTests modules allows any authenticated attacker with admin privileges local execution of Code.
PRODUCT AFFECTED:
This issue affects
OTRS: from 7.0.X before 7.0.45, from 8.0.X before 8.0.35
((OTRS)) Community Edition: from 6.0.1 through 6.0.34
PROBLEM:
CWE-78 Improper Neutralization of Special Elements used in an OS Command (‘OS Command Injection’) CWE-78
Impact:
CAPEC-549 Local Execution of Code CAPEC-549
Product Status
Product | Affected |
OTRS AG OTRS » System Configuration, UnitTests
Default status is affected |
from 7.0.x before 7.0.45
from 8.0.x before 8.0.35 |
OTRS AG ((OTRS)) Community Edition
Default status is affected |
from 6.0.1 through 6.0.34 |
SOLUTION:
Update to OTRS 8.0.35 or OTRS 7.0.45
MODIFICATION HISTORY:
- —
RELATED LINKS:
CVSS SCORE:
3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
RISK LEVEL:
HIGH
ACKNOWLEDGEMENTS:
Special thanks to Tim Püttmanns for reporting these vulnerability.