An issue was discovered in Open Ticket Request System (OTRS) 7.x through 7.0.6 and Community Edition 5.0.x through 5.0.35 and 6.0.x through 6.0.17. An attacker who is logged into OTRS as an agent user with appropriate permissions may manipulate the URL to cause execution of JavaScript in the context of OTRS.
References
Configurations
Configuration 1 (hide)
|
History
21 Nov 2024, 04:18
Type | Values Removed | Values Added |
---|---|---|
References | () http://lists.opensuse.org/opensuse-security-announce/2020-04/msg00038.html - Broken Link | |
References | () http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00066.html - Broken Link | |
References | () http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00077.html - Broken Link | |
References | () https://community.otrs.com/security-advisory-2019-05-security-update-for-otrs-framework/ - Patch, Vendor Advisory |
Information
Published : 2019-05-22 00:29
Updated : 2024-11-21 04:18
NVD link : CVE-2019-10067
Mitre link : CVE-2019-10067
CVE.ORG link : CVE-2019-10067
JSON object : View
Products Affected
otrs
- otrs
CWE
CWE-79
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')