Due to improper handling of uploaded images it is possible in very unlikely and rare conditions to force the agents browser to execute malicious javascript from a special crafted SVG file rendered as inline jpg file. This issue affects: ((OTRS)) Community Edition 5.0.x version 5.0.39 and prior versions; 6.0.x version 6.0.24 and prior versions. OTRS 7.0.x version 7.0.13 and prior versions.
References
Link | Resource |
---|---|
https://otrs.com/release-notes/otrs-security-advisory-2020-02/ | Patch Vendor Advisory |
https://lists.debian.org/debian-lts-announce/2020/01/msg00027.html | Mailing List Not Applicable Third Party Advisory |
http://lists.opensuse.org/opensuse-security-announce/2020-04/msg00038.html | Broken Link |
http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00066.html | Broken Link |
http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00077.html | Broken Link |
Information
Published : 2020-01-10 07:15
Updated : 2023-01-27 07:16
NVD link : CVE-2020-1766
Mitre link : CVE-2020-1766
JSON object : View
CWE
CWE-79
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
Products Affected
debian
- debian_linux
otrs
- otrs