Vulnerabilites related to otrs - faq
Vulnerability from fkie_nvd
Published
2019-11-27 19:15
Modified
2024-11-21 01:52
Severity ?
Summary
An Access Bypass issue exists in OTRS Help Desk before 3.2.4, 3.1.14, and 3.0.19, OTRS ITSM before 3.2.3, 3.1.8, and 3.0.7, and FAQ before 2.2.3, 2.1.4, and 2.0.8. Access rights by the object linking mechanism is not verified
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
otrs | faq | * | |
otrs | faq | * | |
otrs | faq | * | |
otrs | otrs_help_desk | * | |
otrs | otrs_help_desk | * | |
otrs | otrs_help_desk | * | |
otrs | otrs_itsm | * | |
otrs | otrs_itsm | * | |
otrs | otrs_itsm | * | |
debian | debian_linux | 8.0 | |
debian | debian_linux | 9.0 | |
debian | debian_linux | 10.0 | |
opensuse | opensuse | 12.2 | |
opensuse | opensuse | 12.3 |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:otrs:faq:*:*:*:*:*:*:*:*", "matchCriteriaId": "BDE24232-72B7-40BC-BDC9-4889D3C80842", "versionEndExcluding": "2.0.8", "versionStartIncluding": "2.0.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:otrs:faq:*:*:*:*:*:*:*:*", "matchCriteriaId": "A51091CA-6321-45F1-9FAA-EB45AF1949BA", "versionEndExcluding": "2.1.4", "versionStartIncluding": "2.1.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:otrs:faq:*:*:*:*:*:*:*:*", "matchCriteriaId": "9F9DC926-6983-499F-964B-5EB88112B522", "versionEndExcluding": "2.2.3", "versionStartIncluding": "2.2.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:otrs:otrs_help_desk:*:*:*:*:*:*:*:*", "matchCriteriaId": "EF1A2A1D-F946-47E6-8183-A971AF6EC301", "versionEndExcluding": "3.0.19", "versionStartIncluding": "3.0.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:otrs:otrs_help_desk:*:*:*:*:*:*:*:*", "matchCriteriaId": "37B820B3-72F1-43C3-80B1-D0C18DE1C261", "versionEndExcluding": "3.1.14", "versionStartIncluding": "3.1.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:otrs:otrs_help_desk:*:*:*:*:*:*:*:*", "matchCriteriaId": "28F96A54-4D16-4166-B422-E55C2D5C82FD", "versionEndExcluding": "3.2.4", "versionStartExcluding": "3.2.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:otrs:otrs_itsm:*:*:*:*:*:*:*:*", "matchCriteriaId": "D294EC50-C72B-4DF4-A868-4AE6A8FDCFED", "versionEndExcluding": "3.0.7", "versionStartIncluding": "3.0.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:otrs:otrs_itsm:*:*:*:*:*:*:*:*", "matchCriteriaId": "8E23D8BE-818F-4F17-93C4-6E35840648AD", "versionEndExcluding": "3.1.8", "versionStartIncluding": "3.1.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:otrs:otrs_itsm:*:*:*:*:*:*:*:*", "matchCriteriaId": "92B9FDF3-4FE0-4C4E-80D2-4EE05CA898D6", "versionEndExcluding": "3.2.3", "versionStartIncluding": "3.2.0", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*", "matchCriteriaId": "C11E6FB0-C8C0-4527-9AA0-CB9B316F8F43", "vulnerable": true }, { "criteria": "cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*", "matchCriteriaId": "DEECE5FC-CACF-4496-A3E7-164736409252", "vulnerable": true }, { "criteria": "cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*", "matchCriteriaId": "07B237A9-69A3-4A9C-9DA0-4E06BD37AE73", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:opensuse:opensuse:12.2:*:*:*:*:*:*:*", "matchCriteriaId": "D806A17E-B8F9-466D-807D-3F1E77603DC8", "vulnerable": true }, { "criteria": "cpe:2.3:o:opensuse:opensuse:12.3:*:*:*:*:*:*:*", "matchCriteriaId": "DFBF430B-0832-44B0-AA0E-BA9E467F7668", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "An Access Bypass issue exists in OTRS Help Desk before 3.2.4, 3.1.14, and 3.0.19, OTRS ITSM before 3.2.3, 3.1.8, and 3.0.7, and FAQ before 2.2.3, 2.1.4, and 2.0.8. Access rights by the object linking mechanism is not verified" }, { "lang": "es", "value": "Existe un problema de Omisi\u00f3n de Acceso en OTRS Help Desk versiones anteriores a la versi\u00f3n 3.2.4, 3.1.14 y 3.0.19, OTRS ITSM versiones anteriores a la versi\u00f3n 3.2.3, 3.1.8 y 3.0.7, y FAQ versiones anteriores a la versi\u00f3n 2.2.3, 2.1.4, y 2.0.8. Los derechos de acceso por el mecanismo de enlace de objetos no son comprobados." } ], "id": "CVE-2013-2625", "lastModified": "2024-11-21T01:52:03.917", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 6.4, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:N", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 4.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 2.5, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2019-11-27T19:15:11.713", "references": [ { "source": "cve@mitre.org", "tags": [ "Broken Link", "Third Party Advisory" ], "url": "http://archives.neohapsis.com/archives/bugtraq/2013-08/0009.html" }, { "source": "cve@mitre.org", "tags": [ "Release Notes", "Third Party Advisory" ], "url": "http://lists.opensuse.org/opensuse-updates/2013-08/msg00027.html" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securityfocus.com/bid/58936" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/83287" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://security-tracker.debian.org/tracker/CVE-2013-2625" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Broken Link", "Third Party Advisory" ], "url": "http://archives.neohapsis.com/archives/bugtraq/2013-08/0009.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Release Notes", "Third Party Advisory" ], "url": "http://lists.opensuse.org/opensuse-updates/2013-08/msg00027.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securityfocus.com/bid/58936" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/83287" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://security-tracker.debian.org/tracker/CVE-2013-2625" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-269" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2021-03-22 09:15
Modified
2024-11-21 05:48
Severity ?
3.5 (Low) - CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:L/I:N/A:N
4.3 (Medium) - CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N
4.3 (Medium) - CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N
Summary
Agents are able to see linked FAQ articles without permissions (defined in FAQ Category). This issue affects: FAQ version 6.0.29 and prior versions, OTRS version 7.0.24 and prior versions.
References
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:otrs:faq:*:*:*:*:*:*:*:*", "matchCriteriaId": "5B3670FD-E893-4F88-A619-0898E422EBDE", "versionEndExcluding": "6.0.29", "versionStartIncluding": "6.0.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:otrs:otrs:*:*:*:*:*:*:*:*", "matchCriteriaId": "49D03751-FD5B-45FA-B77C-5ECE233C5818", "versionEndExcluding": "7.0.24", "versionStartIncluding": "7.0.0", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Agents are able to see linked FAQ articles without permissions (defined in FAQ Category). This issue affects: FAQ version 6.0.29 and prior versions, OTRS version 7.0.24 and prior versions." }, { "lang": "es", "value": "Los agentes pueden ser capaces de visualizar art\u00edculos de FAQ vinculados sin permisos (definidos en la categor\u00eda FAQ).\u0026#xa0;Este problema afecta a: FAQ versi\u00f3n 6.0.29 y anteriores, OTRS versi\u00f3n 7.0.24 y anteriores" } ], "id": "CVE-2021-21438", "lastModified": "2024-11-21T05:48:21.740", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "NONE", "baseScore": 4.0, "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:S/C:P/I:N/A:N", "version": "2.0" }, "exploitabilityScore": 8.0, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 3.5, "baseSeverity": "LOW", "confidentialityImpact": "LOW", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:L/I:N/A:N", "version": "3.1" }, "exploitabilityScore": 2.1, "impactScore": 1.4, "source": "security@otrs.com", "type": "Secondary" }, { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 4.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 1.4, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2021-03-22T09:15:13.437", "references": [ { "source": "security@otrs.com", "tags": [ "Vendor Advisory" ], "url": "https://otrs.com/release-notes/otrs-security-advisory-2021-08/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://otrs.com/release-notes/otrs-security-advisory-2021-08/" } ], "sourceIdentifier": "security@otrs.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-264" } ], "source": "security@otrs.com", "type": "Secondary" }, { "description": [ { "lang": "en", "value": "CWE-276" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2020-02-12 17:15
Modified
2024-11-21 01:52
Severity ?
Summary
A Cross-Site Scripting (XSS) Vulnerability exists in OTRS ITSM prior to 3.2.4, 3.1.8, and 3.0.7 and FAQ prior to 2.1.4 and 2.0.8 via changes, workorder items, and FAQ articles, which could let a remote malicious user execute arbitrary code.
References
▶ | URL | Tags | |
---|---|---|---|
cve@mitre.org | http://lists.opensuse.org/opensuse-updates/2013-08/msg00027.html | Mailing List, Third Party Advisory | |
cve@mitre.org | http://www.exploit-db.com/exploits/24922 | Exploit, Third Party Advisory, VDB Entry | |
cve@mitre.org | http://www.securityfocus.com/bid/58930 | Third Party Advisory, VDB Entry | |
cve@mitre.org | https://exchange.xforce.ibmcloud.com/vulnerabilities/83288 | Third Party Advisory, VDB Entry | |
af854a3a-2127-422b-91ae-364da2661108 | http://lists.opensuse.org/opensuse-updates/2013-08/msg00027.html | Mailing List, Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.exploit-db.com/exploits/24922 | Exploit, Third Party Advisory, VDB Entry | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.securityfocus.com/bid/58930 | Third Party Advisory, VDB Entry | |
af854a3a-2127-422b-91ae-364da2661108 | https://exchange.xforce.ibmcloud.com/vulnerabilities/83288 | Third Party Advisory, VDB Entry |
Impacted products
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:otrs:faq:*:*:*:*:*:*:*:*", "matchCriteriaId": "002EF3F8-1077-4C5D-A487-357AB6BFEB95", "versionEndExcluding": "2.0.8", "vulnerable": true }, { "criteria": "cpe:2.3:a:otrs:faq:*:*:*:*:*:*:*:*", "matchCriteriaId": "A51091CA-6321-45F1-9FAA-EB45AF1949BA", "versionEndExcluding": "2.1.4", "versionStartIncluding": "2.1.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:otrs:otrs_itsm:*:*:*:*:*:*:*:*", "matchCriteriaId": "76BF84E1-3633-4CFF-BB7B-4B126D1FD435", "versionEndExcluding": "3.0.7", "vulnerable": true }, { "criteria": "cpe:2.3:a:otrs:otrs_itsm:*:*:*:*:*:*:*:*", "matchCriteriaId": "8E23D8BE-818F-4F17-93C4-6E35840648AD", "versionEndExcluding": "3.1.8", "versionStartIncluding": "3.1.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:otrs:otrs_itsm:*:*:*:*:*:*:*:*", "matchCriteriaId": "6303666A-A55B-436F-8895-D0F63F387E50", "versionEndExcluding": "3.2.4", "versionStartIncluding": "3.2.0", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:opensuse:opensuse:12.2:*:*:*:*:*:*:*", "matchCriteriaId": "D806A17E-B8F9-466D-807D-3F1E77603DC8", "vulnerable": true }, { "criteria": "cpe:2.3:o:opensuse:opensuse:12.3:*:*:*:*:*:*:*", "matchCriteriaId": "DFBF430B-0832-44B0-AA0E-BA9E467F7668", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "A Cross-Site Scripting (XSS) Vulnerability exists in OTRS ITSM prior to 3.2.4, 3.1.8, and 3.0.7 and FAQ prior to 2.1.4 and 2.0.8 via changes, workorder items, and FAQ articles, which could let a remote malicious user execute arbitrary code." }, { "lang": "es", "value": "Se presenta una vulnerabilidad de tipo Cross-Site Scripting (XSS) en OTRS ITSM versiones anteriores a 3.2.4, 3.1.8 y 3.0.7 y FAQ versiones anteriores a 2.1.4 y 2.0.8, por medio de changes, workorder items, y FAQ articles, podr\u00edan permitir a un usuario malicioso remoto ejecutar c\u00f3digo arbitrario." } ], "id": "CVE-2013-2637", "lastModified": "2024-11-21T01:52:05.780", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 4.3, "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ], "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.1, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 2.7, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2020-02-12T17:15:11.733", "references": [ { "source": "cve@mitre.org", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://lists.opensuse.org/opensuse-updates/2013-08/msg00027.html" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory", "VDB Entry" ], "url": "http://www.exploit-db.com/exploits/24922" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securityfocus.com/bid/58930" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/83288" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://lists.opensuse.org/opensuse-updates/2013-08/msg00027.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Third Party Advisory", "VDB Entry" ], "url": "http://www.exploit-db.com/exploits/24922" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securityfocus.com/bid/58930" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/83288" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-79" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2016-09-17 02:59
Modified
2025-04-12 10:46
Severity ?
Summary
Multiple SQL injection vulnerabilities in the FAQ package 2.x before 2.3.6, 4.x before 4.0.5, and 5.x before 5.0.5 in Open Ticket Request System (OTRS) allow remote attackers to execute arbitrary SQL commands via crafted search parameters.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
otrs | faq | 2.0.1 | |
otrs | faq | 2.0.2 | |
otrs | faq | 2.0.3 | |
otrs | faq | 2.0.4 | |
otrs | faq | 2.0.5 | |
otrs | faq | 2.0.6 | |
otrs | faq | 2.0.7 | |
otrs | faq | 2.0.8 | |
otrs | faq | 2.1.0 | |
otrs | faq | 2.1.1 | |
otrs | faq | 2.1.2 | |
otrs | faq | 2.1.3 | |
otrs | faq | 2.1.4 | |
otrs | faq | 2.2.0 | |
otrs | faq | 2.2.1 | |
otrs | faq | 2.2.2 | |
otrs | faq | 2.2.3 | |
otrs | faq | 2.3.0 | |
otrs | faq | 2.3.1 | |
otrs | faq | 2.3.2 | |
otrs | faq | 2.3.3 | |
otrs | faq | 2.3.4 | |
otrs | faq | 4.0.0 | |
otrs | faq | 4.0.1 | |
otrs | faq | 4.0.2 | |
otrs | faq | 4.0.3 | |
otrs | faq | 5.0.0 | |
otrs | faq | 5.0.1 | |
otrs | faq | 5.0.2 | |
otrs | faq | 5.0.3 |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:otrs:faq:2.0.1:*:*:*:*:*:*:*", "matchCriteriaId": "DF53776A-0A19-4638-ABA1-93044F31FED7", "vulnerable": true }, { "criteria": "cpe:2.3:a:otrs:faq:2.0.2:*:*:*:*:*:*:*", "matchCriteriaId": "3126ABA3-8303-4B25-930E-A208D0D5B27A", "vulnerable": true }, { "criteria": "cpe:2.3:a:otrs:faq:2.0.3:*:*:*:*:*:*:*", "matchCriteriaId": "564730FA-0895-4EAF-823B-11CBE1F4A8D4", "vulnerable": true }, { "criteria": "cpe:2.3:a:otrs:faq:2.0.4:*:*:*:*:*:*:*", "matchCriteriaId": "A4936D7A-9858-4F8B-8B4A-598DAE80AED9", "vulnerable": true }, { "criteria": "cpe:2.3:a:otrs:faq:2.0.5:*:*:*:*:*:*:*", "matchCriteriaId": "C3949781-32DE-4AC0-B2B0-533D0ACA8C5B", "vulnerable": true }, { "criteria": "cpe:2.3:a:otrs:faq:2.0.6:*:*:*:*:*:*:*", "matchCriteriaId": "678BD8D5-1571-4473-86FE-1077C8DA706F", "vulnerable": true }, { "criteria": "cpe:2.3:a:otrs:faq:2.0.7:*:*:*:*:*:*:*", "matchCriteriaId": "EB08D130-598E-46D4-863F-CDF05FB63B1E", "vulnerable": true }, { "criteria": "cpe:2.3:a:otrs:faq:2.0.8:*:*:*:*:*:*:*", "matchCriteriaId": "84954FB7-5A9E-4473-8A2F-6DC16A7B1ACF", "vulnerable": true }, { "criteria": "cpe:2.3:a:otrs:faq:2.1.0:*:*:*:*:*:*:*", "matchCriteriaId": "6B952DD0-E610-4112-90FE-B86A114FF31D", "vulnerable": true }, { "criteria": "cpe:2.3:a:otrs:faq:2.1.1:*:*:*:*:*:*:*", "matchCriteriaId": "BDAAEB0A-8F5A-4B92-BCC8-6C0D08D8E9B1", "vulnerable": true }, { "criteria": "cpe:2.3:a:otrs:faq:2.1.2:*:*:*:*:*:*:*", "matchCriteriaId": "9E2FB9C4-917D-4A8B-A38A-7ACF2E200DDC", "vulnerable": true }, { "criteria": "cpe:2.3:a:otrs:faq:2.1.3:*:*:*:*:*:*:*", "matchCriteriaId": "28772AD8-76C8-4BE9-9A10-13070A99A47C", "vulnerable": true }, { "criteria": "cpe:2.3:a:otrs:faq:2.1.4:*:*:*:*:*:*:*", "matchCriteriaId": "EA785F1E-8ECC-4D91-929C-6F5D785FB373", "vulnerable": true }, { "criteria": "cpe:2.3:a:otrs:faq:2.2.0:*:*:*:*:*:*:*", "matchCriteriaId": "F7E867A3-6D69-4248-A422-2AEFFC255DC2", "vulnerable": true }, { "criteria": "cpe:2.3:a:otrs:faq:2.2.1:*:*:*:*:*:*:*", "matchCriteriaId": "39499513-EEB9-42F1-8636-2BC4DDFEB2F8", "vulnerable": true }, { "criteria": "cpe:2.3:a:otrs:faq:2.2.2:*:*:*:*:*:*:*", "matchCriteriaId": "04502B53-0C72-4D2A-9707-984A4A30F555", "vulnerable": true }, { "criteria": "cpe:2.3:a:otrs:faq:2.2.3:*:*:*:*:*:*:*", "matchCriteriaId": "EB8A087F-FD27-466A-99F0-ADB2797C1DE1", "vulnerable": true }, { "criteria": "cpe:2.3:a:otrs:faq:2.3.0:*:*:*:*:*:*:*", "matchCriteriaId": "DA13E2EB-EB43-4116-B023-957FC461548B", "vulnerable": true }, { "criteria": "cpe:2.3:a:otrs:faq:2.3.1:*:*:*:*:*:*:*", "matchCriteriaId": "A3092DCB-8923-463A-A6BA-4CA9F0B36E97", "vulnerable": true }, { "criteria": "cpe:2.3:a:otrs:faq:2.3.2:*:*:*:*:*:*:*", "matchCriteriaId": "B93929D8-FB5E-4FB6-BE90-D434254ACC31", "vulnerable": true }, { "criteria": "cpe:2.3:a:otrs:faq:2.3.3:*:*:*:*:*:*:*", "matchCriteriaId": "B44ECC63-55CD-496D-A0A8-E441286FD4B5", "vulnerable": true }, { "criteria": "cpe:2.3:a:otrs:faq:2.3.4:*:*:*:*:*:*:*", "matchCriteriaId": "C8C4AFC8-DF9F-444D-9CC5-79862C8B76CF", "vulnerable": true }, { "criteria": "cpe:2.3:a:otrs:faq:4.0.0:*:*:*:*:*:*:*", "matchCriteriaId": "5985ADCC-94F9-48EF-A1DC-7738CA799263", "vulnerable": true }, { "criteria": "cpe:2.3:a:otrs:faq:4.0.1:*:*:*:*:*:*:*", "matchCriteriaId": "E74BF575-1B17-4580-997E-593C9320C9BA", "vulnerable": true }, { "criteria": "cpe:2.3:a:otrs:faq:4.0.2:*:*:*:*:*:*:*", "matchCriteriaId": "04DB156D-0787-48B8-96E0-7B164C1F62CC", "vulnerable": true }, { "criteria": "cpe:2.3:a:otrs:faq:4.0.3:*:*:*:*:*:*:*", "matchCriteriaId": "503EB086-3739-458A-8E2D-1C9408D08CEF", "vulnerable": true }, { "criteria": "cpe:2.3:a:otrs:faq:5.0.0:*:*:*:*:*:*:*", "matchCriteriaId": "2CC2689C-C387-42E1-9369-BBC1017F88DC", "vulnerable": true }, { "criteria": "cpe:2.3:a:otrs:faq:5.0.1:*:*:*:*:*:*:*", "matchCriteriaId": "60E5FE9D-EDFE-43DE-B633-69DADFADBB84", "vulnerable": true }, { "criteria": "cpe:2.3:a:otrs:faq:5.0.2:*:*:*:*:*:*:*", "matchCriteriaId": "DDBF1C52-FD7F-4F65-BB4D-BAB64E9E3BB2", "vulnerable": true }, { "criteria": "cpe:2.3:a:otrs:faq:5.0.3:*:*:*:*:*:*:*", "matchCriteriaId": "B15DC811-CE41-4F0A-AAC8-B5A5F4A541CC", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Multiple SQL injection vulnerabilities in the FAQ package 2.x before 2.3.6, 4.x before 4.0.5, and 5.x before 5.0.5 in Open Ticket Request System (OTRS) allow remote attackers to execute arbitrary SQL commands via crafted search parameters." }, { "lang": "es", "value": "M\u00faltiples vulnerabilidades de inyecci\u00f3n SQL en el paquete FAQ 2.x en versiones anteriores a 2.3.6, 4.x en versiones anteriores a 4.0.5 y 5.x en versiones anteriores a 5.0.5 en Open Ticket Request System (OTRS) permiten a atacantes remotos ejecutar comandos SQL arbitrarios a trav\u00e9s de par\u00e1metros de b\u00fasqueda manipulados." } ], "id": "CVE-2016-5843", "lastModified": "2025-04-12T10:46:40.837", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 9.0, "confidentialityImpact": "COMPLETE", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:N/C:C/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 8.5, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV30": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "LOW", "baseScore": 9.4, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:L", "version": "3.0" }, "exploitabilityScore": 3.9, "impactScore": 5.5, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2016-09-17T02:59:00.147", "references": [ { "source": "cve@mitre.org", "url": "http://www.securityfocus.com/bid/93019" }, { "source": "cve@mitre.org", "tags": [ "Issue Tracking", "Patch" ], "url": "https://github.com/OTRS/FAQ/commit/3700f75c67f6ed1d39bc213445c6d12a458e1af9" }, { "source": "cve@mitre.org", "tags": [ "Issue Tracking", "Patch" ], "url": "https://github.com/OTRS/FAQ/commit/8c9d63bd0297adda760330805c31afc130861557" }, { "source": "cve@mitre.org", "tags": [ "Issue Tracking", "Patch" ], "url": "https://github.com/OTRS/FAQ/commit/b805703e7b7725d1f3040bb626a4c4dd845ee9e3" }, { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "https://www.otrs.com/security-advisory-2016-01-security-update-otrs-faq-package/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securityfocus.com/bid/93019" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Issue Tracking", "Patch" ], "url": "https://github.com/OTRS/FAQ/commit/3700f75c67f6ed1d39bc213445c6d12a458e1af9" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Issue Tracking", "Patch" ], "url": "https://github.com/OTRS/FAQ/commit/8c9d63bd0297adda760330805c31afc130861557" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Issue Tracking", "Patch" ], "url": "https://github.com/OTRS/FAQ/commit/b805703e7b7725d1f3040bb626a4c4dd845ee9e3" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://www.otrs.com/security-advisory-2016-01-security-update-otrs-faq-package/" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Deferred", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-89" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
CVE-2013-2625 (GCVE-0-2013-2625)
Vulnerability from cvelistv5
Published
2019-11-27 18:08
Modified
2024-08-06 15:44
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- n/a
Summary
An Access Bypass issue exists in OTRS Help Desk before 3.2.4, 3.1.14, and 3.0.19, OTRS ITSM before 3.2.3, 3.1.8, and 3.0.7, and FAQ before 2.2.3, 2.1.4, and 2.0.8. Access rights by the object linking mechanism is not verified
References
► | URL | Tags | |||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-06T15:44:32.364Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://security-tracker.debian.org/tracker/CVE-2013-2625" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "http://lists.opensuse.org/opensuse-updates/2013-08/msg00027.html" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "http://archives.neohapsis.com/archives/bugtraq/2013-08/0009.html" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "http://www.securityfocus.com/bid/58936" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/83287" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2013-08-02T00:00:00", "descriptions": [ { "lang": "en", "value": "An Access Bypass issue exists in OTRS Help Desk before 3.2.4, 3.1.14, and 3.0.19, OTRS ITSM before 3.2.3, 3.1.8, and 3.0.7, and FAQ before 2.2.3, 2.1.4, and 2.0.8. Access rights by the object linking mechanism is not verified" } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2019-11-27T18:08:35", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://security-tracker.debian.org/tracker/CVE-2013-2625" }, { "tags": [ "x_refsource_MISC" ], "url": "http://lists.opensuse.org/opensuse-updates/2013-08/msg00027.html" }, { "tags": [ "x_refsource_MISC" ], "url": "http://archives.neohapsis.com/archives/bugtraq/2013-08/0009.html" }, { "tags": [ "x_refsource_MISC" ], "url": "http://www.securityfocus.com/bid/58936" }, { "tags": [ "x_refsource_MISC" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/83287" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2013-2625", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "An Access Bypass issue exists in OTRS Help Desk before 3.2.4, 3.1.14, and 3.0.19, OTRS ITSM before 3.2.3, 3.1.8, and 3.0.7, and FAQ before 2.2.3, 2.1.4, and 2.0.8. Access rights by the object linking mechanism is not verified" } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "https://security-tracker.debian.org/tracker/CVE-2013-2625", "refsource": "MISC", "url": "https://security-tracker.debian.org/tracker/CVE-2013-2625" }, { "name": "http://lists.opensuse.org/opensuse-updates/2013-08/msg00027.html", "refsource": "MISC", "url": "http://lists.opensuse.org/opensuse-updates/2013-08/msg00027.html" }, { "name": "http://archives.neohapsis.com/archives/bugtraq/2013-08/0009.html", "refsource": "MISC", "url": "http://archives.neohapsis.com/archives/bugtraq/2013-08/0009.html" }, { "name": "http://www.securityfocus.com/bid/58936", "refsource": "MISC", "url": "http://www.securityfocus.com/bid/58936" }, { "name": "https://exchange.xforce.ibmcloud.com/vulnerabilities/83287", "refsource": "MISC", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/83287" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2013-2625", "datePublished": "2019-11-27T18:08:35", "dateReserved": "2013-03-18T00:00:00", "dateUpdated": "2024-08-06T15:44:32.364Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2016-5843 (GCVE-0-2016-5843)
Vulnerability from cvelistv5
Published
2016-09-17 01:00
Modified
2024-08-06 01:15
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- n/a
Summary
Multiple SQL injection vulnerabilities in the FAQ package 2.x before 2.3.6, 4.x before 4.0.5, and 5.x before 5.0.5 in Open Ticket Request System (OTRS) allow remote attackers to execute arbitrary SQL commands via crafted search parameters.
References
► | URL | Tags | |||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-06T01:15:10.790Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://www.otrs.com/security-advisory-2016-01-security-update-otrs-faq-package/" }, { "name": "93019", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/93019" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://github.com/OTRS/FAQ/commit/b805703e7b7725d1f3040bb626a4c4dd845ee9e3" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://github.com/OTRS/FAQ/commit/8c9d63bd0297adda760330805c31afc130861557" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://github.com/OTRS/FAQ/commit/3700f75c67f6ed1d39bc213445c6d12a458e1af9" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2016-06-25T00:00:00", "descriptions": [ { "lang": "en", "value": "Multiple SQL injection vulnerabilities in the FAQ package 2.x before 2.3.6, 4.x before 4.0.5, and 5.x before 5.0.5 in Open Ticket Request System (OTRS) allow remote attackers to execute arbitrary SQL commands via crafted search parameters." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2016-11-25T19:57:01", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "https://www.otrs.com/security-advisory-2016-01-security-update-otrs-faq-package/" }, { "name": "93019", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/93019" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://github.com/OTRS/FAQ/commit/b805703e7b7725d1f3040bb626a4c4dd845ee9e3" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://github.com/OTRS/FAQ/commit/8c9d63bd0297adda760330805c31afc130861557" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://github.com/OTRS/FAQ/commit/3700f75c67f6ed1d39bc213445c6d12a458e1af9" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2016-5843", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Multiple SQL injection vulnerabilities in the FAQ package 2.x before 2.3.6, 4.x before 4.0.5, and 5.x before 5.0.5 in Open Ticket Request System (OTRS) allow remote attackers to execute arbitrary SQL commands via crafted search parameters." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "https://www.otrs.com/security-advisory-2016-01-security-update-otrs-faq-package/", "refsource": "CONFIRM", "url": "https://www.otrs.com/security-advisory-2016-01-security-update-otrs-faq-package/" }, { "name": "93019", "refsource": "BID", "url": "http://www.securityfocus.com/bid/93019" }, { "name": "https://github.com/OTRS/FAQ/commit/b805703e7b7725d1f3040bb626a4c4dd845ee9e3", "refsource": "CONFIRM", "url": "https://github.com/OTRS/FAQ/commit/b805703e7b7725d1f3040bb626a4c4dd845ee9e3" }, { "name": "https://github.com/OTRS/FAQ/commit/8c9d63bd0297adda760330805c31afc130861557", "refsource": "CONFIRM", "url": "https://github.com/OTRS/FAQ/commit/8c9d63bd0297adda760330805c31afc130861557" }, { "name": "https://github.com/OTRS/FAQ/commit/3700f75c67f6ed1d39bc213445c6d12a458e1af9", "refsource": "CONFIRM", "url": "https://github.com/OTRS/FAQ/commit/3700f75c67f6ed1d39bc213445c6d12a458e1af9" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2016-5843", "datePublished": "2016-09-17T01:00:00", "dateReserved": "2016-06-23T00:00:00", "dateUpdated": "2024-08-06T01:15:10.790Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2021-21438 (GCVE-0-2021-21438)
Vulnerability from cvelistv5
Published
2021-03-22 08:50
Modified
2024-09-17 01:46
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- CWE-264 - Permissions, Privileges, and Access Controls
Summary
Agents are able to see linked FAQ articles without permissions (defined in FAQ Category). This issue affects: FAQ version 6.0.29 and prior versions, OTRS version 7.0.24 and prior versions.
References
► | URL | Tags | |||
---|---|---|---|---|---|
|
Impacted products
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T18:16:22.278Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://otrs.com/release-notes/otrs-security-advisory-2021-08/" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "FAQ", "vendor": "OTRS AG", "versions": [ { "lessThanOrEqual": "6.0.29", "status": "affected", "version": "6.0.x", "versionType": "custom" } ] }, { "product": "OTRS", "vendor": "OTRS AG", "versions": [ { "lessThanOrEqual": "7.0.24", "status": "affected", "version": "unspecified", "versionType": "custom" } ] } ], "credits": [ { "lang": "en", "value": "Christopher Theuerkauf" } ], "datePublic": "2021-03-22T00:00:00", "descriptions": [ { "lang": "en", "value": "Agents are able to see linked FAQ articles without permissions (defined in FAQ Category). This issue affects: FAQ version 6.0.29 and prior versions, OTRS version 7.0.24 and prior versions." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 3.5, "baseSeverity": "LOW", "confidentialityImpact": "LOW", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:L/I:N/A:N", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-264", "description": "CWE-264 Permissions, Privileges, and Access Controls", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2021-03-22T08:50:17", "orgId": "2e1bf29f-dc29-4ed8-830c-7b9348b6f0e8", "shortName": "OTRS" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://otrs.com/release-notes/otrs-security-advisory-2021-08/" } ], "solutions": [ { "lang": "en", "value": "Update to OTRS 7.0.25." } ], "source": { "advisory": "OSA-2021-08", "defect": [ "2021020842001809" ], "discovery": "USER" }, "title": "FAQ articles are shown to users without permission", "x_generator": { "engine": "Vulnogram 0.0.9" }, "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "security@otrs.com", "DATE_PUBLIC": "2021-03-22T00:00:00.000Z", "ID": "CVE-2021-21438", "STATE": "PUBLIC", "TITLE": "FAQ articles are shown to users without permission" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "FAQ", "version": { "version_data": [ { "version_affected": "\u003c=", "version_name": "6.0.x", "version_value": "6.0.29" } ] } }, { "product_name": "OTRS", "version": { "version_data": [ { "version_affected": "\u003c=", "version_value": "7.0.24" } ] } } ] }, "vendor_name": "OTRS AG" } ] } }, "credit": [ { "lang": "eng", "value": "Christopher Theuerkauf" } ], "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Agents are able to see linked FAQ articles without permissions (defined in FAQ Category). This issue affects: FAQ version 6.0.29 and prior versions, OTRS version 7.0.24 and prior versions." } ] }, "generator": { "engine": "Vulnogram 0.0.9" }, "impact": { "cvss": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 3.5, "baseSeverity": "LOW", "confidentialityImpact": "LOW", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:L/I:N/A:N", "version": "3.1" } }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "CWE-264 Permissions, Privileges, and Access Controls" } ] } ] }, "references": { "reference_data": [ { "name": "https://otrs.com/release-notes/otrs-security-advisory-2021-08/", "refsource": "MISC", "url": "https://otrs.com/release-notes/otrs-security-advisory-2021-08/" } ] }, "solution": [ { "lang": "en", "value": "Update to OTRS 7.0.25." } ], "source": { "advisory": "OSA-2021-08", "defect": [ "2021020842001809" ], "discovery": "USER" } } } }, "cveMetadata": { "assignerOrgId": "2e1bf29f-dc29-4ed8-830c-7b9348b6f0e8", "assignerShortName": "OTRS", "cveId": "CVE-2021-21438", "datePublished": "2021-03-22T08:50:17.683469Z", "dateReserved": "2020-12-29T00:00:00", "dateUpdated": "2024-09-17T01:46:15.159Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2013-2637 (GCVE-0-2013-2637)
Vulnerability from cvelistv5
Published
2020-02-12 16:07
Modified
2024-08-06 15:44
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- n/a
Summary
A Cross-Site Scripting (XSS) Vulnerability exists in OTRS ITSM prior to 3.2.4, 3.1.8, and 3.0.7 and FAQ prior to 2.1.4 and 2.0.8 via changes, workorder items, and FAQ articles, which could let a remote malicious user execute arbitrary code.
References
► | URL | Tags | ||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-06T15:44:32.659Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "http://lists.opensuse.org/opensuse-updates/2013-08/msg00027.html" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "http://www.securityfocus.com/bid/58930" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "http://www.exploit-db.com/exploits/24922" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/83288" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2013-04-02T00:00:00", "descriptions": [ { "lang": "en", "value": "A Cross-Site Scripting (XSS) Vulnerability exists in OTRS ITSM prior to 3.2.4, 3.1.8, and 3.0.7 and FAQ prior to 2.1.4 and 2.0.8 via changes, workorder items, and FAQ articles, which could let a remote malicious user execute arbitrary code." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2020-02-12T16:07:19", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "http://lists.opensuse.org/opensuse-updates/2013-08/msg00027.html" }, { "tags": [ "x_refsource_MISC" ], "url": "http://www.securityfocus.com/bid/58930" }, { "tags": [ "x_refsource_MISC" ], "url": "http://www.exploit-db.com/exploits/24922" }, { "tags": [ "x_refsource_MISC" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/83288" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2013-2637", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "A Cross-Site Scripting (XSS) Vulnerability exists in OTRS ITSM prior to 3.2.4, 3.1.8, and 3.0.7 and FAQ prior to 2.1.4 and 2.0.8 via changes, workorder items, and FAQ articles, which could let a remote malicious user execute arbitrary code." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "http://lists.opensuse.org/opensuse-updates/2013-08/msg00027.html", "refsource": "MISC", "url": "http://lists.opensuse.org/opensuse-updates/2013-08/msg00027.html" }, { "name": "http://www.securityfocus.com/bid/58930", "refsource": "MISC", "url": "http://www.securityfocus.com/bid/58930" }, { "name": "http://www.exploit-db.com/exploits/24922", "refsource": "MISC", "url": "http://www.exploit-db.com/exploits/24922" }, { "name": "https://exchange.xforce.ibmcloud.com/vulnerabilities/83288", "refsource": "MISC", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/83288" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2013-2637", "datePublished": "2020-02-12T16:07:19", "dateReserved": "2013-03-22T00:00:00", "dateUpdated": "2024-08-06T15:44:32.659Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }