Security
Headlines
HeadlinesLatestCVEs

Headline

CVE-2023-5422: OTRS Security Advisory 2023-10 | OTRS

The functions to fetch e-mail via POP3 or IMAP as well as sending e-mail via SMTP use OpenSSL for static SSL or TLS based communication. As the SSL_get_verify_result() function is not used the certificated is trusted always and it can not be ensured that the certificate satisfies all necessary security requirements.

This could allow an attacker to use an invalid certificate to claim to be a trusted host, use expired certificates, or conduct other attacks that could be detected if the certificate is properly validated.

This issue affects OTRS: from 7.0.X before 7.0.47, from 8.0.X before 8.0.37; ((OTRS)) Community Edition: from 6.0.X through 6.0.34.

CVE
#vulnerability#perl#ssl

Please read carefully and check if the version of your OTRS system is affected by this vulnerability.

Please send information regarding vulnerabilities in OTRS to: [email protected]

PGP Key

  • pub 2048R/9C227C6B 2011-03-21
  • uid OTRS Security Team <[email protected]>
  • GPG Fingerprint E330 4608 DA6E 34B7 1551 C244 7F9E 44E9 9C22 7C6B

Security Advisory Details

  • ID: OSA-2023-10
  • Date: 2023-10-16
  • Title: SSL Certificates are not checked for E-Mail Handling
  • Severity: 8.7 HIGH
  • Product: OTRS 7.0.x, OTRS 8.0.x
  • Fixed in: OTRS 7.0.47, OTRS 8.0.37
  • CVSS: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:N
  • References: CVE-2023-5422

OSA-2023-10 SSL Certificates are not checked for E-Mail Handling (CVE-2023-5422)

The functions to fetch e-mail via POP3 or IMAP as well as sending e-mail via SMTP use OpenSSL for static SSL or TLS based communication. As the SSL_get_verify_result() function is not used the certificated is trusted always and it can not be ensured that the certificate satisfies all necessary security requirements.

This could allow an attacker to use an invalid certificate to claim to be a trusted host, use expired certificates, or conduct other attacks that could be detected if the certificate is properly validated.

PRODUCT AFFECTED:

This issue affects

OTRS: from 7.0.X before 7.0.47,
OTRS: from 8.0.X before 8.0.37
((OTRS)) Community Edition: from 6.0.X through 6.0.34.

PROBLEM:

CWE-295 Improper Certificate Validation CWE-295

Impact:

CAPEC-475 Signature Spoofing by Improper Validation CAPEC-475

Product Status

OTRS AG OTRS » Agent interface

Default status is affected

from 7.0.x before 7.0.47

from 8.0.x before 8.0.37

OTRS AG ((OTRS)) Community Edition » Agent Interface

Default status is affected

from 6.0.x through 6.0.34

SOLUTION:

Update to OTRS 7.0.47 or OTRS 8.0.37.

MODIFICATION HISTORY:

CVSS SCORE:

  • CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:N

RISK LEVEL:

LOW

ACKNOWLEDGEMENTS:

Special thanks to Matthias Terlinde for reporting these vulnerability.

CVE: Latest News

CVE-2023-50976: Transactions API Authorization by oleiman · Pull Request #14969 · redpanda-data/redpanda
CVE-2023-6905
CVE-2023-6903
CVE-2023-6904
CVE-2023-3907