CVE-2014-1694

Multiple cross-site request forgery (CSRF) vulnerabilities in (1) CustomerPreferences.pm, (2) CustomerTicketMessage.pm, (3) CustomerTicketProcess.pm, and (4) CustomerTicketZoom.pm in Kernel/Modules/ in Open Ticket Request System (OTRS) 3.1.x before 3.1.19, 3.2.x before 3.2.14, and 3.3.x before 3.3.4 allow remote attackers to hijack the authentication of arbitrary users for requests that (5) create tickets or (6) send follow-ups to existing tickets.
References
Link Resource
http://bugs.otrs.org/show_bug.cgi?id=10099
http://osvdb.org/102632
http://secunia.com/advisories/56644 Vendor Advisory
http://secunia.com/advisories/56655 Vendor Advisory
http://www.debian.org/security/2014/dsa-2867
http://www.openwall.com/lists/oss-security/2014/01/29/15
http://www.openwall.com/lists/oss-security/2014/01/29/7
https://github.com/OTRS/otrs/commit/6f324aaf8647729d509eebf063a0181f9f9196f7 Exploit Patch
https://github.com/OTRS/otrs/commit/92f417277f43832f1a0462f2485fe1fd3fd52312 Exploit Patch
https://github.com/OTRS/otrs/commit/ca2c3390fd60d9a3f810ed2c22cbc2c193457b77 Exploit Patch
https://www.otrs.com/release-notes-otrs-help-desk-3-3-4
https://www.otrs.com/security-advisory-2014-01-csrf-issue-customer-web-interface Patch Vendor Advisory
http://bugs.otrs.org/show_bug.cgi?id=10099
http://osvdb.org/102632
http://secunia.com/advisories/56644 Vendor Advisory
http://secunia.com/advisories/56655 Vendor Advisory
http://www.debian.org/security/2014/dsa-2867
http://www.openwall.com/lists/oss-security/2014/01/29/15
http://www.openwall.com/lists/oss-security/2014/01/29/7
https://github.com/OTRS/otrs/commit/6f324aaf8647729d509eebf063a0181f9f9196f7 Exploit Patch
https://github.com/OTRS/otrs/commit/92f417277f43832f1a0462f2485fe1fd3fd52312 Exploit Patch
https://github.com/OTRS/otrs/commit/ca2c3390fd60d9a3f810ed2c22cbc2c193457b77 Exploit Patch
https://www.otrs.com/release-notes-otrs-help-desk-3-3-4
https://www.otrs.com/security-advisory-2014-01-csrf-issue-customer-web-interface Patch Vendor Advisory
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:otrs:otrs:3.2.0:*:*:*:*:*:*:*
cpe:2.3:a:otrs:otrs:3.2.0:beta1:*:*:*:*:*:*
cpe:2.3:a:otrs:otrs:3.2.0:beta2:*:*:*:*:*:*
cpe:2.3:a:otrs:otrs:3.2.0:beta3:*:*:*:*:*:*
cpe:2.3:a:otrs:otrs:3.2.0:beta4:*:*:*:*:*:*
cpe:2.3:a:otrs:otrs:3.2.0:beta5:*:*:*:*:*:*
cpe:2.3:a:otrs:otrs:3.2.0:rc1:*:*:*:*:*:*
cpe:2.3:a:otrs:otrs:3.2.1:*:*:*:*:*:*:*
cpe:2.3:a:otrs:otrs:3.2.2:*:*:*:*:*:*:*
cpe:2.3:a:otrs:otrs:3.2.3:*:*:*:*:*:*:*
cpe:2.3:a:otrs:otrs:3.2.4:*:*:*:*:*:*:*
cpe:2.3:a:otrs:otrs:3.2.5:*:*:*:*:*:*:*
cpe:2.3:a:otrs:otrs:3.2.6:*:*:*:*:*:*:*
cpe:2.3:a:otrs:otrs:3.2.7:*:*:*:*:*:*:*
cpe:2.3:a:otrs:otrs:3.2.8:*:*:*:*:*:*:*
cpe:2.3:a:otrs:otrs:3.2.9:*:*:*:*:*:*:*
cpe:2.3:a:otrs:otrs:3.2.10:*:*:*:*:*:*:*

Configuration 2 (hide)

OR cpe:2.3:a:otrs:otrs:3.1.0:*:*:*:*:*:*:*
cpe:2.3:a:otrs:otrs:3.1.1:*:*:*:*:*:*:*
cpe:2.3:a:otrs:otrs:3.1.2:*:*:*:*:*:*:*
cpe:2.3:a:otrs:otrs:3.1.3:*:*:*:*:*:*:*
cpe:2.3:a:otrs:otrs:3.1.4:*:*:*:*:*:*:*
cpe:2.3:a:otrs:otrs:3.1.5:*:*:*:*:*:*:*
cpe:2.3:a:otrs:otrs:3.1.6:*:*:*:*:*:*:*
cpe:2.3:a:otrs:otrs:3.1.7:*:*:*:*:*:*:*
cpe:2.3:a:otrs:otrs:3.1.8:*:*:*:*:*:*:*
cpe:2.3:a:otrs:otrs:3.1.9:*:*:*:*:*:*:*
cpe:2.3:a:otrs:otrs:3.1.10:*:*:*:*:*:*:*
cpe:2.3:a:otrs:otrs:3.1.11:*:*:*:*:*:*:*
cpe:2.3:a:otrs:otrs:3.1.13:*:*:*:*:*:*:*
cpe:2.3:a:otrs:otrs:3.1.14:*:*:*:*:*:*:*
cpe:2.3:a:otrs:otrs:3.1.15:*:*:*:*:*:*:*
cpe:2.3:a:otrs:otrs:3.1.16:*:*:*:*:*:*:*
cpe:2.3:a:otrs:otrs:3.1.17:*:*:*:*:*:*:*
cpe:2.3:a:otrs:otrs:3.1.18:*:*:*:*:*:*:*

Configuration 3 (hide)

OR cpe:2.3:a:otrs:otrs:3.3.0:*:*:*:*:*:*:*
cpe:2.3:a:otrs:otrs:3.3.0:beta1:*:*:*:*:*:*
cpe:2.3:a:otrs:otrs:3.3.0:beta2:*:*:*:*:*:*
cpe:2.3:a:otrs:otrs:3.3.0:beta3:*:*:*:*:*:*
cpe:2.3:a:otrs:otrs:3.3.0:beta4:*:*:*:*:*:*
cpe:2.3:a:otrs:otrs:3.3.0:beta5:*:*:*:*:*:*
cpe:2.3:a:otrs:otrs:3.3.0:rc1:*:*:*:*:*:*
cpe:2.3:a:otrs:otrs:3.3.1:*:*:*:*:*:*:*
cpe:2.3:a:otrs:otrs:3.3.2:*:*:*:*:*:*:*
cpe:2.3:a:otrs:otrs:3.3.3:*:*:*:*:*:*:*

History

21 Nov 2024, 02:04

Type Values Removed Values Added
References () http://bugs.otrs.org/show_bug.cgi?id=10099 - () http://bugs.otrs.org/show_bug.cgi?id=10099 -
References () http://osvdb.org/102632 - () http://osvdb.org/102632 -
References () http://secunia.com/advisories/56644 - Vendor Advisory () http://secunia.com/advisories/56644 - Vendor Advisory
References () http://secunia.com/advisories/56655 - Vendor Advisory () http://secunia.com/advisories/56655 - Vendor Advisory
References () http://www.debian.org/security/2014/dsa-2867 - () http://www.debian.org/security/2014/dsa-2867 -
References () http://www.openwall.com/lists/oss-security/2014/01/29/15 - () http://www.openwall.com/lists/oss-security/2014/01/29/15 -
References () http://www.openwall.com/lists/oss-security/2014/01/29/7 - () http://www.openwall.com/lists/oss-security/2014/01/29/7 -
References () https://github.com/OTRS/otrs/commit/6f324aaf8647729d509eebf063a0181f9f9196f7 - Exploit, Patch () https://github.com/OTRS/otrs/commit/6f324aaf8647729d509eebf063a0181f9f9196f7 - Exploit, Patch
References () https://github.com/OTRS/otrs/commit/92f417277f43832f1a0462f2485fe1fd3fd52312 - Exploit, Patch () https://github.com/OTRS/otrs/commit/92f417277f43832f1a0462f2485fe1fd3fd52312 - Exploit, Patch
References () https://github.com/OTRS/otrs/commit/ca2c3390fd60d9a3f810ed2c22cbc2c193457b77 - Exploit, Patch () https://github.com/OTRS/otrs/commit/ca2c3390fd60d9a3f810ed2c22cbc2c193457b77 - Exploit, Patch
References () https://www.otrs.com/release-notes-otrs-help-desk-3-3-4 - () https://www.otrs.com/release-notes-otrs-help-desk-3-3-4 -
References () https://www.otrs.com/security-advisory-2014-01-csrf-issue-customer-web-interface - Patch, Vendor Advisory () https://www.otrs.com/security-advisory-2014-01-csrf-issue-customer-web-interface - Patch, Vendor Advisory

Information

Published : 2014-02-04 21:55

Updated : 2024-11-21 02:04


NVD link : CVE-2014-1694

Mitre link : CVE-2014-1694

CVE.ORG link : CVE-2014-1694


JSON object : View

Products Affected

otrs

  • otrs
CWE
CWE-352

Cross-Site Request Forgery (CSRF)