Summary
This host is installed with OTRS (Open Ticket Request System) and is prone to cross-site scripting vulnerability.
Impact
Successful exploitation will allow remote attackers to steal the victim's cookie-based authentication credentials.
Impact Level: Application
Solution
Upgrade to OTRS (Open Ticket Request System) version 2.4.15, 3.0.17 and 3.1.11 or later, For updates refer to http://www.otrs.com/en/ or Apply patch from the vendor advisory link http://otrs.org/advisory/OSA-2012-03-en/
Insight
An error exists in application which fails to properly sanitize user-supplied input before using it
Affected
OTRS (Open Ticket Request System) version 2.4.x before 2.4.15, 3.0.x before 3.0.17, and 3.1.x before 3.1.11
Detection
Get the installed version of OTRS with the help of detect NVT and check the version is vulnerable or not.
References
- http://osvdb.org/85074
- http://otrs.org/advisory/OSA-2012-03-en/
- http://secunia.com/advisories/50465/
- http://secunia.com/advisories/51031/
- http://www.exploit-db.com/exploits/20959/
- http://www.exploit-db.com/exploits/22070/
- http://www.securityfocus.com/bid/56093
- http://xforce.iss.net/xforce/xfdb/79451
Updated on 2015-03-25
Severity
Classification
-
CVE CVE-2012-4751 -
CVSS Base Score: 4.3
AV:N/AC:M/Au:N/C:N/I:P/A:N
Related Vulnerabilities