Release Note

OTRS Security Advisory 2023-06

Please read carefully and check if the version of your OTRS system is affected by this vulnerability.

Please send information regarding vulnerabilities in OTRS to: security@otrs.org

PGP Key

  • pub 2048R/9C227C6B 2011-03-21
  • uid OTRS Security Team <security@otrs.org>
  • GPG Fingerprint E330 4608 DA6E 34B7 1551 C244 7F9E 44E9 9C22 7C6B

Security Advisory Details

  • ID: OSA-2023-06
  • Date: 2023-07-24
  • Title: Possible XSS stored in survey answers
  • Severity: 4.1 MEDIUM
  • Product: Survey 6.0.x, Survey 7.0.x, Survey 8.0.x
  • Fixed in: Survey 7.0.32, Survey 8.0.13
  • CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:N/I:L/A:N
  • References: CVE-2023-38057

OSA-2023-06 Possible XSS stored in survey answers (CVE-2023-38057)

An improper input validation vulnerability in OTRS Survey modules allows any attacker with a link to a valid and unanswered survey request to inject javascript code in free text answers. This allows a cross site scripting attack while reading the replies as authenticated agent.

PRODUCT AFFECTED:

This issue affects

OTRS Survey module from 7.0.X before 7.0.32, from 8.0.X before 8.0.13

((OTRS)) Community Edition Survey module from 6.0.X through 6.0.22.

Required configuration for exposure:

Free text answers have to be used.

PROBLEM:

CWE-20 Improper Input Validation CWE-20

Impact:

CAPEC-63 Cross-Site Scripting (XSS) CAPEC-63

Product Status

Product Affected
OTRS AG OTRS

Default status is affected

from 7.0.x before 7.0.32

from 8.0.x before 8.0.13

OTRS AG ((OTRS)) Community Edition

Default status is affected

from 6.0.x through 6.0.22

SOLUTION:

Update Survey package to version 8.0.13 and 7.0.32

MODIFICATION HISTORY:

CVSS SCORE:

  • CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:N/I:L/A:N

RISK LEVEL:

MEDIUM

ACKNOWLEDGEMENTS:

Special thanks to Daniel Mizael, Raphael Fiorin and Marcelo Makotofrom for reporting these vulnerability.

Release Details

  • Release:
    OTRS Security Advisory 2023-06
  • Release date:
    07/24/2023