In OTRS 6.0.x up to and including 6.0.1, OTRS 5.0.x up to and including 5.0.24, and OTRS 4.0.x up to and including 4.0.26, an attacker who is logged into OTRS as an agent can manipulate form parameters (related to PGP) and execute arbitrary shell commands with the permissions of the OTRS or web server user.
References
Link | Resource |
---|---|
https://www.otrs.com/security-advisory-2017-09-security-update-otrs-framework/ | Issue Tracking Patch Vendor Advisory |
https://www.debian.org/security/2017/dsa-4066 | Mailing List Third Party Advisory |
https://www.exploit-db.com/exploits/43853/ | Exploit Third Party Advisory VDB Entry |
https://lists.debian.org/debian-lts-announce/2017/12/msg00015.html | Mailing List Third Party Advisory |
http://packetstormsecurity.com/files/162295/OTRS-6.0.1-Remote-Command-Execution.html |
Configurations
Configuration 1 (hide)
|
Configuration 2 (hide)
|
Information
Published : 2017-12-08 07:29
Updated : 2021-04-22 11:15
NVD link : CVE-2017-16921
Mitre link : CVE-2017-16921
JSON object : View
CWE
CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
Products Affected
debian
- debian_linux
otrs
- otrs