Summary
This host is installed with OTRS (Open Ticket Request System) and is prone to multiple input validation vulnerabilities.
Impact
Successful exploitation will allow remote attackers to steal the victim's cookie-based authentication credentials or execute arbitrary SQL commands and bypass authentication.
Impact Level: Application
Solution
Upgrade to OTRS (Open Ticket Request System) version 1.3.3 or 2.0.4 or later, For updates refer to http://www.otrs.com/en/
Insight
Multiple error exists in the application which fails to validate below user-supplied input's properly
For XSS attack (1) QueueID parameter and (2) Action parameters (3) AttachmentDownloadType.
For SQL attack (1) user parameter (2) TicketID and (3) ArticleID parameters
Affected
OTRS (Open Ticket Request System) version 1.0.0 through 1.3.2 and 2.0.0 through 2.0.3
Detection
Get the installed version of OTRS with the help of detect NVT and check the version is vulnerable or not.
References
- http://osvdb.org/21064
- http://osvdb.org/21065
- http://osvdb.org/21066
- http://osvdb.org/21067
- http://secunia.com/advisories/17685
- http://www.otrs.com/en/open-source/community-news/security-advisories/security-advisory-2005-01/
- http://www.securityfocus.com/bid/15537
- http://xforce.iss.net/xforce/xfdb/34164
Updated on 2015-03-25
Severity
Classification
-
CVE CVE-2005-3893, CVE-2005-3894, CVE-2005-3895 -
CVSS Base Score: 7.5
AV:N/AC:L/Au:N/C:P/I:P/A:P
Related Vulnerabilities