Release Note
OTRS Security Advisory 2023-06
Please read carefully and check if the version of your OTRS system is affected by this vulnerability.
Please send information regarding vulnerabilities in OTRS to: security@otrs.org
PGP Key
- pub 2048R/9C227C6B 2011-03-21
- uid OTRS Security Team <security@otrs.org>
- GPG Fingerprint E330 4608 DA6E 34B7 1551 C244 7F9E 44E9 9C22 7C6B
Security Advisory Details
- ID: OSA-2023-06
- Date: 2023-07-24
- Title: Possible XSS stored in survey answers
- Severity: 4.1 MEDIUM
- Product: Survey 6.0.x, Survey 7.0.x, Survey 8.0.x
- Fixed in: Survey 7.0.32, Survey 8.0.13
- CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:N/I:L/A:N
- References: CVE-2023-38057
OSA-2023-06 Possible XSS stored in survey answers (CVE-2023-38057)
An improper input validation vulnerability in OTRS Survey modules allows any attacker with a link to a valid and unanswered survey request to inject javascript code in free text answers. This allows a cross site scripting attack while reading the replies as authenticated agent.
PRODUCT AFFECTED:
This issue affects
OTRS Survey module from 7.0.X before 7.0.32, from 8.0.X before 8.0.13
((OTRS)) Community Edition Survey module from 6.0.X through 6.0.22.
Required configuration for exposure:
Free text answers have to be used.
PROBLEM:
CWE-20 Improper Input Validation CWE-20
Impact:
CAPEC-63 Cross-Site Scripting (XSS) CAPEC-63
Product Status
Product | Affected |
OTRS AG OTRS
Default status is affected |
from 7.0.x before 7.0.32
from 8.0.x before 8.0.13 |
OTRS AG ((OTRS)) Community Edition
Default status is affected |
from 6.0.x through 6.0.22 |
SOLUTION:
Update Survey package to version 8.0.13 and 7.0.32
MODIFICATION HISTORY:
- —
RELATED LINKS:
CVSS SCORE:
- CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:N/I:L/A:N
RISK LEVEL:
MEDIUM
ACKNOWLEDGEMENTS:
Special thanks to Daniel Mizael, Raphael Fiorin and Marcelo Makotofrom for reporting these vulnerability.