FreeBSD : OTRS -- Multiple vulnerabilities (cebd05d6-ed7b-11e7-95f2-005056925db4)

high Nessus Plugin ID 105503

Language:

Synopsis

The remote FreeBSD host is missing a security-related update.

Description

OTRS reports :

An attacker who is logged into OTRS as an agent can request special URLs from OTRS which can lead to the execution of shell commands with the permissions of the web server user.

An attacker who is logged into OTRS as a customer can use the ticket search form to disclose internal article information of their customer tickets.

An attacker who is logged into OTRS as an agent can manipulate form parameters and execute arbitrary shell commands with the permissions of the OTRS or web server user.

An attacker can send a specially prepared email to an OTRS system. If this system has cookie support disabled, and a logged in agent clicks a link in this email, the session information could be leaked to external systems, allowing the attacker to take over the agent's session.

Solution

Update the affected package.

See Also

http://www.nessus.org/u?18e3a5f8

http://www.nessus.org/u?6e7e98e6

http://www.nessus.org/u?36865b73

https://bugs.freebsd.org/bugzilla/show_bug.cgi?id=224729

http://www.nessus.org/u?beea29c5

http://www.nessus.org/u?0c1c4eb3

Plugin Details

Severity: High

ID: 105503

File Name: freebsd_pkg_cebd05d6ed7b11e795f2005056925db4.nasl

Version: 3.6

Type: local

Published: 1/2/2018

Updated: 1/4/2021

Supported Sensors: Nessus

Risk Information

VPR

Risk Factor: Medium

Score: 6.7

CVSS v2

Risk Factor: High

Base Score: 9

Temporal Score: 7

Vector: CVSS2#AV:N/AC:L/Au:S/C:C/I:C/A:C

CVSS v3

Risk Factor: High

Base Score: 8.8

Temporal Score: 7.9

Vector: CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

Temporal Vector: CVSS:3.0/E:P/RL:O/RC:C

Vulnerability Information

CPE: p-cpe:/a:freebsd:freebsd:otrs, cpe:/o:freebsd:freebsd

Required KB Items: Host/local_checks_enabled, Host/FreeBSD/release, Host/FreeBSD/pkg_info

Exploit Available: true

Exploit Ease: Exploits are available

Patch Publication Date: 12/30/2017

Vulnerability Publication Date: 11/21/2017

Reference Information

CVE: CVE-2017-16664, CVE-2017-16854, CVE-2017-16921