ESB-2018.3647 - [UNIX/Linux][Debian] otrs2: Multiple vulnerabilities 2018-11-26

Printable version
PGP/GPG verifiable version

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256

===========================================================================
             AUSCERT External Security Bulletin Redistribution

                               ESB-2018.3647
                    [DLA 1592-1] otrs2 security update
                             26 November 2018

===========================================================================

        AusCERT Security Bulletin Summary
        ---------------------------------

Product:           otrs2
Publisher:         Debian
Operating System:  Debian GNU/Linux 8
                   UNIX variants (UNIX, Linux, OSX)
Impact/Access:     Increased Privileges   -- Existing Account
                   Delete Arbitrary Files -- Existing Account
Resolution:        Patch/Upgrade
CVE Names:         CVE-2018-19143 CVE-2018-19141 

Original Bulletin: 
   https://lists.debian.org/debian-lts-announce/2018/11/msg00028.html

Comment: This advisory references vulnerabilities in products which run on 
         platforms other than Debian. It is recommended that administrators 
         running otrs2 check for an updated version of the software for their
         operating system.

- --------------------------BEGIN INCLUDED TEXT--------------------

- -----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512

Package        : otrs2
Version        : 3.3.18-1+deb8u7
CVE ID         : CVE-2018-19141 CVE-2018-19143

Two security vulnerabilities were discovered in OTRS, a Ticket Request
System, that may lead to privilege escalation or arbitrary file write.

CVE-2018-19141

    An attacker who is logged into OTRS as an admin user may manipulate
    the URL to cause execution of JavaScript in the context of OTRS.

CVE-2018-19143

    An attacker who is logged into OTRS as a user may manipulate the
    submission form to cause deletion of arbitrary files that the OTRS
    web server user has write access to.

Please also read the upstream advisory for CVE-2018-19141. If you
think you might be affected then you should consider to run the
mentioned clean-up SQL statements to remove possible affected records.

https://community.otrs.com/security-advisory-2018-09-security-update-for-otrs-framework/

For Debian 8 "Jessie", these problems have been fixed in version
3.3.18-1+deb8u7.

We recommend that you upgrade your otrs2 packages.

Further information about Debian LTS security advisories, how to apply
these updates to your system and frequently asked questions can be
found at: https://wiki.debian.org/LTS
- -----BEGIN PGP SIGNATURE-----
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=hcjp
- -----END PGP SIGNATURE-----

- --------------------------END INCLUDED TEXT--------------------

You have received this e-mail bulletin as a result of your organisation's
registration with AusCERT. The mailing list you are subscribed to is
maintained within your organisation, so if you do not wish to continue
receiving these bulletins you should contact your local IT manager. If
you do not know who that is, please send an email to auscert@auscert.org.au
and we will forward your request to the appropriate person.

NOTE: Third Party Rights
This security bulletin is provided as a service to AusCERT's members.  As
AusCERT did not write the document quoted above, AusCERT has had no control
over its content. The decision to follow or act on information or advice
contained in this security bulletin is the responsibility of each user or
organisation, and should be considered in accordance with your organisation's
site policies and procedures. AusCERT takes no responsibility for consequences
which may arise from following or acting on information or advice contained in
this security bulletin.

NOTE: This is only the original release of the security bulletin.  It may
not be updated when updates to the original are made.  If downloading at
a later date, it is recommended that the bulletin is retrieved directly
from the author's website to ensure that the information is still current.

Contact information for the authors of the original document is included
in the Security Bulletin above.  If you have any questions or need further
information, please contact them directly.

Previous advisories and external security bulletins can be retrieved from:

        https://www.auscert.org.au/bulletins/

===========================================================================
Australian Computer Emergency Response Team
The University of Queensland
Brisbane
Qld 4072

Internet Email: auscert@auscert.org.au
Facsimile:      (07) 3365 7031
Telephone:      (07) 3365 4417 (International: +61 7 3365 4417)
                AusCERT personnel answer during Queensland business hours
                which are GMT+10:00 (AEST).
                On call after hours for member emergencies only.
===========================================================================
-----BEGIN PGP SIGNATURE-----
Comment: http://www.auscert.org.au/render.html?it=1967

iQIVAwUBW/skF2aOgq3Tt24GAQiK4w//UPWvpxwH308RnzTXc5dui/0+YUErK0wf
umciMcsVtBwdX6c1TK0R1zxFLXfUdiDLbkQIOGunqFPcf4+9FnvqUtu9iH6t74ft
1W2WCU/gCou2Kv/vQXTQoWj/O2P2h3R2HUKv7lVIr8loFdjU08BenUOfaWmg1sGf
yQlpDEZT2lya3oeGGUKhigkOpP9I/xdVWPbPurfe3MtUalEmlToMZ3yRV0ZVndQw
UYMgGgr0PYdK0pwx0UK+upfgnm5XwxvRcT3spSXPRLXYCxpvg7bMV54ufAwkL0qq
UmNfUtJ9aW6Dh6ijZqaXyiIyWwxVkdtszfGXk1gr7ZFjCJ6xjFQB4Z7U1NHJGwZj
Pqvw2/F/vl03oML7xFV5cfmXtpykDlZzvlcCwfDZFyVWVXgG+Z1xGyCeKwuw5zQV
ul4lejmFboxiPSw/S+rOQwB+RcVzaIhaQOIh3NLd0CPPi0Sat+CFELcU1SfqN2Ji
t82YLkRCzVzjHuyFyVLTtQJFHSloe7VeK9OXNHG63UWxekO3oTV6rICRUsBbwkbN
L3wNKiMA810/z01kTRRhn1nE9ryAIsmrcwnSQiYvbLWNI/zm+o1b/WSug3eiU0+Z
91lJPLrs2TlJLC14emZfZfIgDto2Q/xynp7yozd0YB/MElnJMYY4jmDu/txHIhVH
GH/XbSjHHOY=
=i/Su
-----END PGP SIGNATURE-----

« Back to bulletins