ALT-BU-2019-4041-1
Branch sisyphus update bulletin.
Closed vulnerabilities
Modified: 2024-11-21
CVE-2017-16664
Code injection exists in Kernel/System/Spelling.pm in Open Ticket Request System (OTRS) 5 before 5.0.24, 4 before 4.0.26, and 3.3 before 3.3.20. In the agent interface, an authenticated remote attacker can execute shell commands as the webserver user via URL manipulation.
- [debian-lts-announce] 20171219 [SECURITY] [DLA 1212-1] otrs2 security update
- [debian-lts-announce] 20171219 [SECURITY] [DLA 1212-1] otrs2 security update
- DSA-4047
- DSA-4047
- https://www.otrs.com/security-advisory-2017-07-security-update-otrs-framework/
- https://www.otrs.com/security-advisory-2017-07-security-update-otrs-framework/
Modified: 2024-11-21
CVE-2017-16854
In Open Ticket Request System (OTRS) through 3.3.20, 4 through 4.0.26, 5 through 5.0.24, and 6 through 6.0.1, an attacker who is logged in as a customer can use the ticket search form to disclose internal article information of their customer tickets.
- [debian-lts-announce] 20171219 [SECURITY] [DLA 1212-1] otrs2 security update
- [debian-lts-announce] 20171219 [SECURITY] [DLA 1212-1] otrs2 security update
- DSA-4066
- DSA-4066
- https://www.otrs.com/security-advisory-2017-08-security-update-otrs-framework/
- https://www.otrs.com/security-advisory-2017-08-security-update-otrs-framework/
Modified: 2024-11-21
CVE-2017-16921
In OTRS 6.0.x up to and including 6.0.1, OTRS 5.0.x up to and including 5.0.24, and OTRS 4.0.x up to and including 4.0.26, an attacker who is logged into OTRS as an agent can manipulate form parameters (related to PGP) and execute arbitrary shell commands with the permissions of the OTRS or web server user.
- http://packetstormsecurity.com/files/162295/OTRS-6.0.1-Remote-Command-Execution.html
- http://packetstormsecurity.com/files/162295/OTRS-6.0.1-Remote-Command-Execution.html
- [debian-lts-announce] 20171219 [SECURITY] [DLA 1212-1] otrs2 security update
- [debian-lts-announce] 20171219 [SECURITY] [DLA 1212-1] otrs2 security update
- DSA-4066
- DSA-4066
- 43853
- 43853
- https://www.otrs.com/security-advisory-2017-09-security-update-otrs-framework/
- https://www.otrs.com/security-advisory-2017-09-security-update-otrs-framework/
Modified: 2024-11-21
CVE-2017-17476
Open Ticket Request System (OTRS) 4.0.x before 4.0.28, 5.0.x before 5.0.26, and 6.0.x before 6.0.3, when cookie support is disabled, might allow remote attackers to hijack web sessions and consequently gain privileges via a crafted email.
- https://github.com/OTRS/otrs/commit/26707eaaa791648e6c7ad6aeaa27efd70e7c66eb
- https://github.com/OTRS/otrs/commit/26707eaaa791648e6c7ad6aeaa27efd70e7c66eb
- https://github.com/OTRS/otrs/commit/36e3be99cfe8a9e09afa1b75fdc39f3e28f561fc
- https://github.com/OTRS/otrs/commit/36e3be99cfe8a9e09afa1b75fdc39f3e28f561fc
- https://github.com/OTRS/otrs/commit/720c73fbf53e476ca7dfdf2ae1d4d3d2aad2b953
- https://github.com/OTRS/otrs/commit/720c73fbf53e476ca7dfdf2ae1d4d3d2aad2b953
- [debian-lts-announce] 20171220 [SECURITY] [DLA 1215-1] otrs2 security update
- [debian-lts-announce] 20171220 [SECURITY] [DLA 1215-1] otrs2 security update
- DSA-4069
- DSA-4069
- https://www.otrs.com/security-advisory-2017-10-security-update-otrs-framework/
- https://www.otrs.com/security-advisory-2017-10-security-update-otrs-framework/
Modified: 2024-11-21
CVE-2018-7567
In the Admin Package Manager in Open Ticket Request System (OTRS) 5.0.0 through 5.0.24 and 6.0.0 through 6.0.1, authenticated admins are able to exploit a Blind Remote Code Execution vulnerability by loading a crafted opm file with an embedded CodeInstall element to execute a command on the server during package installation. NOTE: the vendor disputes this issue stating "the behaviour is as designed and needed for different packages to be installed", "there is a security warning if the package is not verified by OTRS Group", and "there is the possibility and responsibility of an admin to check packages before installation which is possible as they are not binary.
Modified: 2024-11-21
CVE-2019-10067
An issue was discovered in Open Ticket Request System (OTRS) 7.x through 7.0.6 and Community Edition 5.0.x through 5.0.35 and 6.0.x through 6.0.17. An attacker who is logged into OTRS as an agent user with appropriate permissions may manipulate the URL to cause execution of JavaScript in the context of OTRS.
- openSUSE-SU-2020:0551
- openSUSE-SU-2020:0551
- openSUSE-SU-2020:1475
- openSUSE-SU-2020:1475
- openSUSE-SU-2020:1509
- openSUSE-SU-2020:1509
- https://community.otrs.com/security-advisory-2019-05-security-update-for-otrs-framework/
- https://community.otrs.com/security-advisory-2019-05-security-update-for-otrs-framework/
Modified: 2024-11-21
CVE-2019-12248
An issue was discovered in Open Ticket Request System (OTRS) 7.0.x through 7.0.7, Community Edition 6.0.x through 6.0.19, and Community Edition 5.0.x through 5.0.36. An attacker could send a malicious email to an OTRS system. If a logged-in agent user quotes it, the email could cause the browser to load external image resources.
- openSUSE-SU-2020:0551
- openSUSE-SU-2020:0551
- openSUSE-SU-2020:1475
- openSUSE-SU-2020:1475
- openSUSE-SU-2020:1509
- openSUSE-SU-2020:1509
- https://lists.debian.org/debian-lts-announce/2019/06/msg00004.html
- https://lists.debian.org/debian-lts-announce/2019/06/msg00004.html
- [debian-lts-announce] 20230831 [SECURITY] [DLA 3551-1] otrs2 security update
- [debian-lts-announce] 20230831 [SECURITY] [DLA 3551-1] otrs2 security update
- https://www.otrs.com/category/release-and-security-notes-en/
- https://www.otrs.com/category/release-and-security-notes-en/
Modified: 2024-11-21
CVE-2019-12497
An issue was discovered in Open Ticket Request System (OTRS) 7.0.x through 7.0.8, Community Edition 6.0.x through 6.0.19, and Community Edition 5.0.x through 5.0.36. In the customer or external frontend, personal information of agents (e.g., Name and mail address) can be disclosed in external notes.
- openSUSE-SU-2020:0551
- openSUSE-SU-2020:0551
- openSUSE-SU-2020:1475
- openSUSE-SU-2020:1475
- openSUSE-SU-2020:1509
- openSUSE-SU-2020:1509
- https://community.otrs.com/category/security-advisories-en/
- https://community.otrs.com/category/security-advisories-en/
- https://lists.debian.org/debian-lts-announce/2019/06/msg00004.html
- https://lists.debian.org/debian-lts-announce/2019/06/msg00004.html
- [debian-lts-announce] 20230831 [SECURITY] [DLA 3551-1] otrs2 security update
- [debian-lts-announce] 20230831 [SECURITY] [DLA 3551-1] otrs2 security update
Modified: 2024-11-21
CVE-2019-12746
An issue was discovered in Open Ticket Request System (OTRS) Community Edition 5.0.x through 5.0.36 and 6.0.x through 6.0.19. A user logged into OTRS as an agent might unknowingly disclose their session ID by sharing the link of an embedded ticket article with third parties. This identifier can be then be potentially abused in order to impersonate the agent user.
- openSUSE-SU-2020:0551
- openSUSE-SU-2020:0551
- openSUSE-SU-2020:1475
- openSUSE-SU-2020:1475
- openSUSE-SU-2020:1509
- openSUSE-SU-2020:1509
- https://community.otrs.com/security-advisory-2019-10-security-update-for-otrs-framework/
- https://community.otrs.com/security-advisory-2019-10-security-update-for-otrs-framework/
- https://lists.debian.org/debian-lts-announce/2019/08/msg00018.html
- https://lists.debian.org/debian-lts-announce/2019/08/msg00018.html
- [debian-lts-announce] 20230831 [SECURITY] [DLA 3551-1] otrs2 security update
- [debian-lts-announce] 20230831 [SECURITY] [DLA 3551-1] otrs2 security update
- https://www.otrs.com/category/release-and-security-notes-en/
- https://www.otrs.com/category/release-and-security-notes-en/
Modified: 2024-11-21
CVE-2019-13458
An issue was discovered in Open Ticket Request System (OTRS) 7.0.x through 7.0.8, and Community Edition 5.0.x through 5.0.36 and 6.0.x through 6.0.19. An attacker who is logged into OTRS as an agent user with appropriate permissions can leverage OTRS notification tags in templates in order to disclose hashed user passwords.
- openSUSE-SU-2020:0551
- openSUSE-SU-2020:0551
- openSUSE-SU-2020:1475
- openSUSE-SU-2020:1475
- openSUSE-SU-2020:1509
- openSUSE-SU-2020:1509
- https://community.otrs.com/security-advisory-2019-12-security-update-for-otrs-framework/
- https://community.otrs.com/security-advisory-2019-12-security-update-for-otrs-framework/
- https://lists.debian.org/debian-lts-announce/2019/08/msg00018.html
- https://lists.debian.org/debian-lts-announce/2019/08/msg00018.html
- [debian-lts-announce] 20230831 [SECURITY] [DLA 3551-1] otrs2 security update
- [debian-lts-announce] 20230831 [SECURITY] [DLA 3551-1] otrs2 security update
- https://www.otrs.com/category/release-and-security-notes-en/
- https://www.otrs.com/category/release-and-security-notes-en/
Modified: 2024-11-21
CVE-2019-16375
An issue was discovered in Open Ticket Request System (OTRS) 7.0.x through 7.0.11, and Community Edition 5.0.x through 5.0.37 and 6.0.x through 6.0.22. An attacker who is logged in as an agent or customer user with appropriate permissions can create a carefully crafted string containing malicious JavaScript code as an article body. This malicious code is executed when an agent composes an answer to the original article.
- openSUSE-SU-2020:0551
- openSUSE-SU-2020:0551
- openSUSE-SU-2020:1475
- openSUSE-SU-2020:1475
- openSUSE-SU-2020:1509
- openSUSE-SU-2020:1509
- https://community.otrs.com/category/security-advisories-en/
- https://community.otrs.com/category/security-advisories-en/
- [debian-lts-announce] 20230831 [SECURITY] [DLA 3551-1] otrs2 security update
- [debian-lts-announce] 20230831 [SECURITY] [DLA 3551-1] otrs2 security update
- https://otrs.com/release-notes/otrs-security-advisory-2019-13/
- https://otrs.com/release-notes/otrs-security-advisory-2019-13/
Modified: 2024-11-21
CVE-2019-9752
An issue was discovered in Open Ticket Request System (OTRS) 5.x before 5.0.34, 6.x before 6.0.16, and 7.x before 7.0.4. An attacker who is logged into OTRS as an agent or a customer user may upload a carefully crafted resource in order to cause execution of JavaScript in the context of OTRS. This is related to Content-type mishandling in Kernel/Modules/PictureUpload.pm.
- openSUSE-SU-2020:0551
- openSUSE-SU-2020:1475
- openSUSE-SU-2020:1509
- https://community.otrs.com/security-advisory-2019-01-security-update-for-otrs-framework
- [debian-lts-announce] 20190319 [SECURITY] [DLA 1721-1] otrs2 security update
- openSUSE-SU-2020:0551
- [debian-lts-announce] 20190319 [SECURITY] [DLA 1721-1] otrs2 security update
- https://community.otrs.com/security-advisory-2019-01-security-update-for-otrs-framework
- openSUSE-SU-2020:1509
- openSUSE-SU-2020:1475
Modified: 2024-11-21
CVE-2019-9892
An issue was discovered in Open Ticket Request System (OTRS) 5.x through 5.0.34, 6.x through 6.0.17, and 7.x through 7.0.6. An attacker who is logged into OTRS as an agent user with appropriate permissions may try to import carefully crafted Report Statistics XML that will result in reading of arbitrary files on the OTRS filesystem.
- openSUSE-SU-2020:0551
- openSUSE-SU-2020:1475
- openSUSE-SU-2020:1509
- https://community.otrs.com/security-advisory-2019-04-security-update-for-otrs-framework/
- https://lists.debian.org/debian-lts-announce/2019/05/msg00003.html
- openSUSE-SU-2020:0551
- https://lists.debian.org/debian-lts-announce/2019/05/msg00003.html
- https://community.otrs.com/security-advisory-2019-04-security-update-for-otrs-framework/
- openSUSE-SU-2020:1509
- openSUSE-SU-2020:1475
Closed bugs
Просьба обновить
Closed vulnerabilities
BDU:2021-03179
Уязвимость универсальной системы мониторинга Zabbix, связанная с обходом авторизации посредством использования ключа, контролируемого пользователем, позволяющая нарушителю обойти страницу входа и получить доступ к странице панели инструментов
Modified: 2024-11-21
CVE-2019-17382
An issue was discovered in zabbix.php?action=dashboard.view&dashboardid=1 in Zabbix through 4.4. An attacker can bypass the login page and access the dashboard page, and then create a Dashboard, Report, Screen, or Map without any Username/Password (i.e., anonymously). All created elements (Dashboard/Report/Screen/Map) are accessible by other users and by an admin.
Closed bugs
Отсутствует бэкенд genesys
Package qt-creator updated to version 4.9.2-alt3 for branch sisyphus in task 240097.
Closed bugs
В качестве дефолта для профиля требует qmake-qt4
Package kde5-kbruch updated to version 19.08.0-alt3 for branch sisyphus in task 240124.
Closed bugs
Не доступна кнопка разворачивания окна в режиме Обучение
Closed bugs
Собран hplip с python2
Closed vulnerabilities
BDU:2020-04513
Уязвимость компонента parser.c библиотеки libxml2, позволяющая нарушителю вызвать отказ в обслуживании
Modified: 2024-11-21
CVE-2019-19956
xmlParseBalancedChunkMemoryRecover in parser.c in libxml2 before 2.9.10 has a memory leak related to newDoc->oldNs.
- openSUSE-SU-2020:0681
- openSUSE-SU-2020:0681
- openSUSE-SU-2020:0781
- openSUSE-SU-2020:0781
- https://cert-portal.siemens.com/productcert/pdf/ssa-292794.pdf
- https://cert-portal.siemens.com/productcert/pdf/ssa-292794.pdf
- https://gitlab.gnome.org/GNOME/libxml2/commit/5a02583c7e683896d84878bd90641d8d9b0d0549
- https://gitlab.gnome.org/GNOME/libxml2/commit/5a02583c7e683896d84878bd90641d8d9b0d0549
- [debian-lts-announce] 20191228 [SECURITY] [DLA 2048-1] libxml2 security update
- [debian-lts-announce] 20191228 [SECURITY] [DLA 2048-1] libxml2 security update
- [debian-lts-announce] 20200909 [SECURITY] [DLA 2369-1] libxml2 security update
- [debian-lts-announce] 20200909 [SECURITY] [DLA 2369-1] libxml2 security update
- FEDORA-2020-0c71c00af4
- FEDORA-2020-0c71c00af4
- FEDORA-2020-7694e8be73
- FEDORA-2020-7694e8be73
- https://security.netapp.com/advisory/ntap-20200114-0002/
- https://security.netapp.com/advisory/ntap-20200114-0002/
- https://us-cert.cisa.gov/ics/advisories/icsa-21-103-08
- https://us-cert.cisa.gov/ics/advisories/icsa-21-103-08
- USN-4274-1
- USN-4274-1
- https://www.oracle.com/security-alerts/cpujul2020.html
- https://www.oracle.com/security-alerts/cpujul2020.html