Release Note
OTRS Security Advisory 2024-03
Please read carefully and check if the version of your OTRS system is affected by this vulnerability.
Please send information regarding vulnerabilities in OTRS to: security@otrs.org
PGP Key
- pub 2048R/9C227C6B 2011-03-21
- uid OTRS Security Team <security@otrs.org>
- GPG Fingerprint E330 4608 DA6E 34B7 1551 C244 7F9E 44E9 9C22 7C6B
Security Advisory Details
- ID: OSA-2024-03
- Date: 2024-01-29
- Title: Insufficient access control
- Severity: 5.3 MEDIUM
- Product: OTRS 7.0.x, OTRS
- Fixed in: OTRS 7.0.49, OTRS 2024.1.1
- FULL CVSS v3.1 VECTOR: CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:N
- References: CVE-2024-23792
OSA-2024-03 Insufficient access control
When adding attachments to ticket comments, another user can add attachments as well impersonating the orginal user. The attack requires a logged-in other user to know the UUID. While the legitimate user completes the comment, the malicious user can add more files to the comment.
PRODUCT AFFECTED:
This issue affects
OTRS: from 7.0.X through 7.0.48, from 8.0.X through 8.0.37, from 2023.X through 2023.1.1.
PROBLEM:
CWE-287 Improper Authentication CWE-287
Impact:
CAPEC-194 Fake the Source of Data CAPEC-194
Product Status
Product | Affected |
OTRS AG OTRS » internal API
Default status is unaffected |
from 7.0.x through 7.0.48
from 8.0.x through 8.0.37 from 2023.x through 2023.1.1 |
MODIFICATION HISTORY:
- —
RELATED LINKS:
CVSS SCORE:
- CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:N
RISK LEVEL:
MEDIUM
ACKNOWLEDGEMENTS:
Special thanks to Matthias Püschel for reporting this vulnerability.