Summary
This host is installed with OTRS:ITSM and is prone to cross-site scripting vulnerability.
Impact
Successful exploitation will allow remote attackers to steal the victim's cookie-based authentication credentials..
Impact Level: Application
Solution
Upgrade to OTRS::ITSM version 3.2.4, 3.1.8 and 3.0.7 or later, For updates refer to http://www.otrs.com/en/ or Apply patch from the vendor advisory link http://otrs.org/advisory/OSA-2012-02-en/
Insight
An error exists in application which fails to properly sanitize user-supplied input before using it
Affected
OTRS::ITSM 3.2.0 up to and including 3.2.3, 3.1.0 up to and including 3.1.7 and 3.0.0 up to and including 3.0.6
Detection
Get the installed version and location of OTRS with the help of detect NVT and check the OTRS and OTRS:ITSM version is vulnerable or not.
References
Severity
Classification
-
CVE CVE-2013-2637 -
CVSS Base Score: 4.3
AV:N/AC:M/Au:N/C:N/I:P/A:N
Related Vulnerabilities
- Adobe ColdFusion Multiple Path Disclosure Vulnerabilities
- Allaire JRun directory browsing vulnerability
- 1024 CMS 1.1.0 Beta 'force_download.php' Local File Include Vulnerability
- Apache Tomcat SecurityConstraints Security Bypass Vulnerability
- Apache Commons Daemon 'jsvc' Information Disclosure Vulnerability