Debian LTS: DLA-1721-1: otrs2 security update

    Date19 Mar 2019
    CategoryDebian LTS
    536
    Posted ByLinuxSecurity Advisories
    It has been discovered that OTRS (Open source Ticket Request System) is susceptible to code injection vulnerability. An attacker who is logged into OTRS as an agent or a customer user may upload a carefully
    
    Package        : otrs2
    Version        : 3.3.18-1+deb8u8
    CVE ID         : CVE-2019-9752
    
    
    It has been discovered that OTRS (Open source Ticket Request System)
    is susceptible to code injection vulnerability. An attacker who is
    logged into OTRS as an agent or a customer user may upload a carefully
    crafted resource in order to cause execution of JavaScript in the
    context of OTRS. This is related to Content-type mishandling.
    
    For Debian 8 "Jessie", this problem has been fixed in version
    3.3.18-1+deb8u8.
    
    We recommend that you upgrade your otrs2 packages.
    
    Further information about Debian LTS security advisories, how to apply
    these updates to your system and frequently asked questions can be
    found at: https://wiki.debian.org/LTS
    
    You are not authorised to post comments.

    LinuxSecurity Poll

    Do you reuse passwords across multiple accounts?

    No answer selected. Please try again.
    Please select either existing option or enter your own, however not both.
    Please select minimum 0 answer(s) and maximum 2 answer(s).
    /component/communitypolls/?task=poll.vote
    13
    radio
    [{"id":"55","title":"Yes","votes":"0","type":"x","order":"1","pct":0,"resources":[]},{"id":"56","title":"No","votes":"0","type":"x","order":"2","pct":0,"resources":[]}]["#ff5b00","#4ac0f2","#b80028","#eef66c","#60bb22","#b96a9a","#62c2cc"]["rgba(255,91,0,0.7)","rgba(74,192,242,0.7)","rgba(184,0,40,0.7)","rgba(238,246,108,0.7)","rgba(96,187,34,0.7)","rgba(185,106,154,0.7)","rgba(98,194,204,0.7)"]350
    bottom200

    We use cookies to provide and improve our services. By using our site, you consent to our Cookie Policy.