Vulnerability Name: | CVE-2017-9324 (CCN-126984) | ||||||||||||||||||||||||||||||||||||||||||||
Assigned: | 2017-06-08 | ||||||||||||||||||||||||||||||||||||||||||||
Published: | 2017-06-08 | ||||||||||||||||||||||||||||||||||||||||||||
Updated: | 2019-10-03 | ||||||||||||||||||||||||||||||||||||||||||||
Summary: | In Open Ticket Request System (OTRS) 3.3.x through 3.3.16, 4.x through 4.0.23, and 5.x through 5.0.19, an attacker with agent permission is capable of opening a specific URL in a browser to gain administrative privileges / full access. Afterward, all system settings can be read and changed. The URLs in question contain index.pl?Action=Installer with ;Subaction=Intro or ;Subaction=Start or ;Subaction=System appended at the end. | ||||||||||||||||||||||||||||||||||||||||||||
CVSS v3 Severity: | 8.8 High (CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H) 7.7 High (Temporal CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C)
5.7 Medium (CCN Temporal CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N/E:U/RL:O/RC:C)
| ||||||||||||||||||||||||||||||||||||||||||||
CVSS v2 Severity: | 6.5 Medium (CVSS v2 Vector: AV:N/AC:L/Au:S/C:P/I:P/A:P)
| ||||||||||||||||||||||||||||||||||||||||||||
Vulnerability Type: | CWE-269 | ||||||||||||||||||||||||||||||||||||||||||||
Vulnerability Consequences: | Bypass Security | ||||||||||||||||||||||||||||||||||||||||||||
References: | Source: MITRE Type: CNA CVE-2017-9324 Source: CCN Type: BugTraq Mailing List, Thu, 8 Jun 2017 09:41:37 GMT [SYSS-2017-018] OTRS - Access to Installation Dialog Source: DEBIAN Type: Third Party Advisory DSA-3876 Source: XF Type: UNKNOWN otrs-cve20179324-sec-bypass(126984) Source: MISC Type: Mailing List, Third Party Advisory, VDB Entry https://packetstormsecurity.com/files/142862/OTRS-Install-Dialog-Disclosure.html Source: CCN Type: OTRS Web site OTRS - Ticket Request System Source: MISC Type: Vendor Advisory https://www.otrs.com/security-advisory-2017-03-security-update-otrs-versions/ | ||||||||||||||||||||||||||||||||||||||||||||
Vulnerable Configuration: | Configuration 1: Configuration 2: Configuration CCN 1: ![]() | ||||||||||||||||||||||||||||||||||||||||||||
Oval Definitions | |||||||||||||||||||||||||||||||||||||||||||||
| |||||||||||||||||||||||||||||||||||||||||||||
BACK |