Vulnerability Note VU#582879

Open Technology Real Services cross-site scripting vulnerability

Original Release date: 22 Aug 2012 | Last revised: 22 Aug 2012

Overview

Open Technology Real Services (OTRS) is susceptible to a cross-site scripting vulnerability.

Description

Open Technology Real Services (OTRS) contains a cross-site scripting (CWE-79) vulnerability in the email body. An attacker may be able to load arbitrary script in the context of the user's browser when they view a specifically crafted email message.

Proof-of-Concept:

  • <DIV STYLE="width: expression(alert('XSS'));">
  • exp/*<XSS STYLE='no\xss:noxss("*//*");xss:&#101;x&#x2F;*XSS*//*/*/pression(alert("XSS"))'>
  • <IMG STYLE="xss:expr/*XSS*/ession(alert('XSS'))">
  • <XSS STYLE="xss:expression(alert('XSS'))">
  • <HEAD><META HTTP-EQUIV="CONTENT-TYPE" CONTENT="text/html; charset=UTF-7"> </HEAD>+ADw-SCRIPT+AD4-alert('XSS');+ADw-/SCRIPT+AD4-
Additional details may be found in the OTRS advisory.

Impact

An attacker may be able to execute arbitrary script in the context of the user's browser.

Solution

Apply an Update
The OTRS advisory states:

    This vulnerability is fixed in OTRS 2.4.13, 3.0.15 and 3.1.9 as well as in in OTRS::ITSM 3.1.6, 3.0.6 and 2.1.5. and it is recommended to upgrade to one of these versions.

Vendor Information (Learn More)

VendorStatusDate NotifiedDate Updated
OTRSAffected13 Jul 201222 Aug 2012
If you are a vendor and your product is affected, let us know.

CVSS Metrics (Learn More)

Group Score Vector
Base 6.1 AV:N/AC:H/Au:N/C:P/I:C/A:N
Temporal 4.8 E:POC/RL:OF/RC:C
Environmental 4.8 CDP:ND/TD:ND/CR:ND/IR:ND/AR:ND

References

Credit

Thanks to Devon Kearns of Offensive Security for reporting this vulnerability.

This document was written by Jared Allar.

Other Information

  • CVE IDs: CVE-2012-2582
  • Date Public: 22 Aug 2012
  • Date First Published: 22 Aug 2012
  • Date Last Updated: 22 Aug 2012
  • Document Revision: 9

Feedback

If you have feedback, comments, or additional information about this vulnerability, please send us email.