Headline
CVE-2023-38056: OTRS Security Advisory 2023-05 | OTRS
Improper Neutralization of commands allowed to be executed via OTRS System Configuration e.g. SchedulerCronTaskModule using UnitTests modules allows any authenticated attacker with admin privileges local execution of Code.This issue affects OTRS: from 7.0.X before 7.0.45, from 8.0.X before 8.0.35; ((OTRS)) Community Edition: from 6.0.1 through 6.0.34.
Please read carefully and check if the version of your OTRS system is affected by this vulnerability.
Please send information regarding vulnerabilities in OTRS to: [email protected]
PGP Key
- pub 2048R/9C227C6B 2011-03-21
- uid OTRS Security Team <[email protected]>
- GPG Fingerprint E330 4608 DA6E 34B7 1551 C244 7F9E 44E9 9C22 7C6B
Security Advisory Details
- D: OSA-2023-05
- Date: 2023-07-24
- Title: Code execution via System Configuration
- Severity: 7.2 HIGH
- Product: ((OTRS)) Community Edition 6.0.x, OTRS 7.0.x, OTRS 8.0.x
- Fixed in: OTRS 7.0.45, OTRS 8.0.35
- CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
- References: CVE-2023-38056
OSA-2023-05 Code execution via System Configuration (CVE-2023-38056)
Improper Neutralization of commands allowed to be executed via OTRS System Configuration e.g. SchedulerCronTaskModule using UnitTests modules allows any authenticated attacker with admin privileges local execution of Code.
PRODUCT AFFECTED:
This issue affects
OTRS: from 7.0.X before 7.0.45, from 8.0.X before 8.0.35
((OTRS)) Community Edition: from 6.0.1 through 6.0.34
PROBLEM:
CWE-78 Improper Neutralization of Special Elements used in an OS Command (‘OS Command Injection’) CWE-78
Impact:
CAPEC-549 Local Execution of Code CAPEC-549
Product Status
OTRS AG OTRS » System Configuration, UnitTests
Default status is affected
from 7.0.x before 7.0.45
from 8.0.x before 8.0.35
OTRS AG ((OTRS)) Community Edition
Default status is affected
from 6.0.1 through 6.0.34
SOLUTION:
Update to OTRS 8.0.35 or OTRS 7.0.45
MODIFICATION HISTORY:
- —
CVSS SCORE:
3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
RISK LEVEL:
HIGH
ACKNOWLEDGEMENTS:
Special thanks to Tim Püttmanns for reporting these vulnerability.