{"vuid":"VU#603276","idnumber":"603276","name":"OTRS contains a cross-site scripting vulnerability","keywords":["otrs","xss","cwe-79"],"overview":"Open Technology Real Services (OTRS) contains a cross-site scripting (XSS) (CWE-79) vulnerability in the body of HTML emails viewed within the OTRS application.","clean_desc":"OTRS is an open source Help Desk and ITIL® V3 compliant IT Service Management platform. OTRS Security Advisory 2012-03 states: This advisory covers vulnerabilities discovered in the OTRS core system. This is a variance of the XSS vulnerability, where an attacker could send a specially prepared HTML email to OTRS which would cause JavaScript code to be executed in your browser while displaying the email. In this case this is achieved by using javascript source attributes with whitespaces. Affected by this vulnerability are all releases of OTRS 2.4.x up to and including 2.4.14, 3.0.x up to and including 3.0.16 and 3.1.x up to and including 3.1.10.","impact":"A remote attacker may be able to perform a cross-site scripting attack against a logged in OTRS user by sending a specifically crafted HTML email.","resolution":"Apply an Update OTRS 2.4.15, 3.0.17 and 3.1.11 were released to address this vulnerability.","workarounds":"","sysaffected":"","thanks":"Thanks to Mike Eduard of Znuny GmbH for reporting this vulnerability.","author":"This document was written by Jared Allar.","public":["http://www.otrs.com/en/open-source/community-news/security-advisories/security-advisory-2012-03/","http://www.otrs.com/en/open-source/community-news/releases-notes/","http://znuny.com/en/#!/advisory/ZSA-2012-03","http://cwe.mitre.org/data/definitions/79.html"],"cveids":["CVE-2012-4751"],"certadvisory":"","uscerttechnicalalert":null,"datecreated":"2012-09-05T12:26:00Z","publicdate":"2012-10-22T00:00:00Z","datefirstpublished":"2012-10-17T13:45:13Z","dateupdated":"2012-10-17T16:16:10Z","revision":19,"vrda_d1_directreport":"1","vrda_d1_population":"2","vrda_d1_impact":"2","cam_widelyknown":"0","cam_exploitation":"0","cam_internetinfrastructure":"0","cam_population":"0","cam_impact":"0","cam_easeofexploitation":"0","cam_attackeraccessrequired":"0","cam_scorecurrent":"0","cam_scorecurrentwidelyknown":"0","cam_scorecurrentwidelyknownexploited":"0","ipprotocol":"","cvss_accessvector":"N","cvss_accesscomplexity":"L","cvss_authentication":null,"cvss_confidentialityimpact":"N","cvss_integrityimpact":"P","cvss_availabilityimpact":"N","cvss_exploitablity":null,"cvss_remediationlevel":"OF","cvss_reportconfidence":"C","cvss_collateraldamagepotential":"ND","cvss_targetdistribution":"M","cvss_securityrequirementscr":"ND","cvss_securityrequirementsir":"ND","cvss_securityrequirementsar":"ND","cvss_basescore":"5","cvss_basevector":"AV:N/AC:L/Au:N/C:N/I:P/A:N","cvss_temporalscore":"3.9","cvss_environmentalscore":"2.9","cvss_environmentalvector":"CDP:ND/TD:M/CR:ND/IR:ND/AR:ND","metric":0.0,"vulnote":null}