FreeBSD : OTRS -- Multiple vulnerabilities (cebd05d6-ed7b-11e7-95f2-005056925db4)

This script is Copyright (C) 2018 Tenable Network Security, Inc.


Synopsis :

The remote FreeBSD host is missing a security-related update.

Description :

OTRS reports :

An attacker who is logged into OTRS as an agent can request special
URLs from OTRS which can lead to the execution of shell commands with
the permissions of the web server user.

An attacker who is logged into OTRS as a customer can use the ticket
search form to disclose internal article information of their customer
tickets.

An attacker who is logged into OTRS as an agent can manipulate form
parameters and execute arbitrary shell commands with the permissions
of the OTRS or web server user.

An attacker can send a specially prepared email to an OTRS system. If
this system has cookie support disabled, and a logged in agent clicks
a link in this email, the session information could be leaked to
external systems, allowing the attacker to take over the agent's
session.

See also :

https://bugs.freebsd.org/bugzilla/show_bug.cgi?id=224729
http://www.nessus.org/u?48f3eb3b
http://www.nessus.org/u?0c1c4eb3
http://www.nessus.org/u?18e3a5f8
http://www.nessus.org/u?6e7e98e6
http://www.nessus.org/u?d10a1c75

Solution :

Update the affected package.

Risk factor :

High / CVSS Base Score : 9.0
(CVSS2#AV:N/AC:L/Au:S/C:C/I:C/A:C)

Family: FreeBSD Local Security Checks

Nessus Plugin ID: 105503 ()

Bugtraq ID:

CVE ID: CVE-2017-16664
CVE-2017-16854
CVE-2017-16921

Ready to Amp Up Your Nessus Experience?

Get Nessus Professional to scan unlimited IPs, run compliance checks & more

Buy Nessus Professional Now