CVE-2020-1771

Source
https://cve.org/CVERecord?id=CVE-2020-1771
Import Source
https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2020-1771.json
JSON Data
https://api.test.osv.dev/v1/vulns/CVE-2020-1771
Downstream
Related
Published
2020-03-27T13:15:15.333Z
Modified
2026-03-13T00:33:57.786169Z
Severity
  • 5.4 (Medium) CVSS_V3 - CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N CVSS Calculator
Summary
[none]
Details

Attacker is able craft an article with a link to the customer address book with malicious content (JavaScript). When agent opens the link, JavaScript code is executed due to the missing parameter encoding. This issue affects: ((OTRS)) Community Edition: 6.0.26 and prior versions. OTRS: 7.0.15 and prior versions.

References

Affected packages

Git /

Affected ranges

Database specific

unresolved_ranges
[
    {
        "events": [
            {
                "introduced": "5.0.0"
            },
            {
                "last_affected": "5.0.41"
            }
        ]
    },
    {
        "events": [
            {
                "introduced": "6.0.0"
            },
            {
                "last_affected": "6.0.26"
            }
        ]
    },
    {
        "events": [
            {
                "introduced": "7.0.0"
            },
            {
                "last_affected": "7.0.15"
            }
        ]
    }
]
source
"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2020-1771.json"