Vulnerability CVE-2017-16921


Published: 2017-12-08

Description:
In OTRS 6.0.x up to and including 6.0.1, OTRS 5.0.x up to and including 5.0.24, and OTRS 4.0.x up to and including 4.0.26, an attacker who is logged into OTRS as an agent can manipulate form parameters (related to PGP) and execute arbitrary shell commands with the permissions of the OTRS or web server user.

See advisories in our WLB2 database:
Topic
Author
Date
Med.
OTRS 5.0.x/6.0.x Remote Command Execution
Bæln0rn
22.01.2018
High
OTRS 6.0.1 Remote Command Execution
Hex_26
22.04.2021

Type:

CWE-78

(Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') )

CVSS2 => (AV:N/AC:L/Au:S/C:C/I:C/A:C)

CVSS Base Score
Impact Subscore
Exploitability Subscore
9/10
10/10
8/10
Exploit range
Attack complexity
Authentication
Remote
Low
Single time
Confidentiality impact
Integrity impact
Availability impact
Complete
Complete
Complete
Affected software
OTRS -> OTRS 
Debian -> Debian linux 

 References:
https://lists.debian.org/debian-lts-announce/2017/12/msg00015.html
https://www.debian.org/security/2017/dsa-4066
https://www.exploit-db.com/exploits/43853/
https://www.otrs.com/security-advisory-2017-09-security-update-otrs-framework/

Copyright 2024, cxsecurity.com

 

Back to Top