UBUNTU-CVE-2020-1771

See a problem?
Source
https://ubuntu.com/security/notices/UBUNTU-CVE-2020-1771
Import Source
https://github.com/canonical/ubuntu-security-notices/blob/main/osv/cve/2020/UBUNTU-CVE-2020-1771.json
JSON Data
https://api.osv.dev/v1/vulns/UBUNTU-CVE-2020-1771
Related
Published
2020-03-27T13:15:00Z
Modified
2020-03-27T13:15:00Z
Severity
  • 5.4 (Medium) CVSS_V3 - CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N CVSS Calculator
Summary
[none]
Details

Attacker is able craft an article with a link to the customer address book with malicious content (JavaScript). When agent opens the link, JavaScript code is executed due to the missing parameter encoding. This issue affects: ((OTRS)) Community Edition: 6.0.26 and prior versions. OTRS: 7.0.15 and prior versions.

References

Affected packages

Ubuntu:Pro:16.04:LTS / otrs2

Package

Name
otrs2

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected

Affected versions

4.*

4.0.10-1

5.*

5.0.1-1
5.0.1-2
5.0.2-1
5.0.3-1
5.0.5-1
5.0.6-1
5.0.7-1

Ecosystem specific

{
    "ubuntu_priority": "medium"
}

Ubuntu:Pro:18.04:LTS / otrs2

Package

Name
otrs2

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected

Affected versions

5.*

5.0.23-1
5.0.24-1

6.*

6.0.1-1
6.0.2-1
6.0.3-1
6.0.4-1
6.0.5-1

Ecosystem specific

{
    "ubuntu_priority": "medium"
}

Ubuntu:20.04:LTS / otrs2

Package

Name
otrs2

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected

Affected versions

6.*

6.0.20-1
6.0.23-2
6.0.24-1
6.0.25-1
6.0.25-2
6.0.25-3
6.0.26-1

Ecosystem specific

{
    "ubuntu_priority": "medium"
}