Boletines de Vulnerabilidades |
Cross-site scripting en OTRS |
|
Clasificación de la vulnerabilidad |
|
Propiedad | Valor |
Nivel de Confianza | Oficial |
Impacto | Obtener acceso |
Dificultad | Experto |
Requerimientos del atacante | Acceso remoto sin cuenta a un servicio estandar |
Información sobre el sistema |
|
Propiedad | Valor |
Fabricante afectado | GNU/Linux |
Software afectado | OTRS 2.0.x |
Descripción |
|
Se ha descubierto una vulnerabilidad del tipo cross-site en OTRS en las versiones 2.0.x en el archivo index.pl. La vulnerabilidad reside en una mala comprobación de la entrada para el parámetro Subaction. Un atacante remoto podría inyectar código web script o HTML de forma arbitraria mediante el parámetro Subaction en un AgentTicketMailbox Action. |
|
Solución |
|
Actualización de software Debian Debian Linux 4.0 Source http://security.debian.org/pool/updates/main/o/otrs2/otrs2_2.0.4p01-18.dsc http://security.debian.org/pool/updates/main/o/otrs2/otrs2_2.0.4p01-18.diff.gz http://security.debian.org/pool/updates/main/o/otrs2/otrs2_2.0.4p01.orig.tar.gz Architecture independent http://security.debian.org/pool/updates/main/o/otrs2/otrs2_2.0.4p01-18_all.deb Debian Debian Linux 4.0 Source http://security.debian.org/pool/updates/main/i/ipsec-tools/ipsec-tools_0.6.6-3.1etch1.dsc http://security.debian.org/pool/updates/main/i/ipsec-tools/ipsec-tools_0.6.6-3.1etch1.diff.gz http://security.debian.org/pool/updates/main/i/ipsec-tools/ipsec-tools_0.6.6.orig.tar.gz Alpha http://security.debian.org/pool/updates/main/i/ipsec-tools/ipsec-tools_0.6.6-3.1etch1_alpha.deb http://security.debian.org/pool/updates/main/i/ipsec-tools/racoon_0.6.6-3.1etch1_alpha.deb AMD64 http://security.debian.org/pool/updates/main/i/ipsec-tools/ipsec-tools_0.6.6-3.1etch1_amd64.deb http://security.debian.org/pool/updates/main/i/ipsec-tools/racoon_0.6.6-3.1etch1_amd64.deb ARM http://security.debian.org/pool/updates/main/i/ipsec-tools/ipsec-tools_0.6.6-3.1etch1_arm.deb http://security.debian.org/pool/updates/main/i/ipsec-tools/racoon_0.6.6-3.1etch1_arm.deb HP Precision http://security.debian.org/pool/updates/main/i/ipsec-tools/ipsec-tools_0.6.6-3.1etch1_hppa.deb http://security.debian.org/pool/updates/main/i/ipsec-tools/racoon_0.6.6-3.1etch1_hppa.deb Intel IA-32 http://security.debian.org/pool/updates/main/i/ipsec-tools/ipsec-tools_0.6.6-3.1etch1_i386.deb http://security.debian.org/pool/updates/main/i/ipsec-tools/racoon_0.6.6-3.1etch1_i386.deb Intel IA-64 http://security.debian.org/pool/updates/main/i/ipsec-tools/ipsec-tools_0.6.6-3.1etch1_ia64.deb http://security.debian.org/pool/updates/main/i/ipsec-tools/racoon_0.6.6-3.1etch1_ia64.deb Big endian MIPS http://security.debian.org/pool/updates/main/i/ipsec-tools/ipsec-tools_0.6.6-3.1etch1_mips.deb http://security.debian.org/pool/updates/main/i/ipsec-tools/racoon_0.6.6-3.1etch1_mips.deb Little endian MIPS http://security.debian.org/pool/updates/main/i/ipsec-tools/ipsec-tools_0.6.6-3.1etch1_mipsel.deb http://security.debian.org/pool/updates/main/i/ipsec-tools/racoon_0.6.6-3.1etch1_mipsel.deb PowerPC http://security.debian.org/pool/updates/main/i/ipsec-tools/ipsec-tools_0.6.6-3.1etch1_powerpc.deb http://security.debian.org/pool/updates/main/i/ipsec-tools/racoon_0.6.6-3.1etch1_powerpc.deb IBM S/390 http://security.debian.org/pool/updates/main/i/ipsec-tools/ipsec-tools_0.6.6-3.1etch1_s390.deb http://security.debian.org/pool/updates/main/i/ipsec-tools/racoon_0.6.6-3.1etch1_s390.deb Sun Sparc http://security.debian.org/pool/updates/main/i/ipsec-tools/ipsec-tools_0.6.6-3.1etch1_sparc.deb http://security.debian.org/pool/updates/main/i/ipsec-tools/racoon_0.6.6-3.1etch1_sparc.deb Suse Linux Las actualizaciones pueden descargarse mediante YAST o del servidor FTP oficial de Suse Linux |
|
Identificadores estándar |
|
Propiedad | Valor |
CVE | CVE-2007-2524 |
BID | |
Recursos adicionales |
|
Debian Security Advisory (DSA 1298-1) http://lists.debian.org/debian-security-announce/debian-security-announce-2007/msg00057.html Debian Security Advisory (DSA 1299-1) http://lists.debian.org/debian-security-announce/debian-security-announce-2007/msg00059.html SUSE Security Summary Report (SUSE-SR:2007:013) http://www.novell.com/linux/security/advisories/2007_13_sr.html |
Histórico de versiones |
||
Versión | Comentario | Fecha |
1.0 | Aviso emitido | 2007-05-29 |
1.1 | Aviso emitido por Debian (DSA 1299-1) | 2007-06-11 |
1.2 | Aviso emitido por Suse (SUSE-SR:2007:013) | 2007-06-25 |