Description
|
|
Multiple vulnerabilities were identified in OTRS (Open source Ticket Request System), which could be exploited by malicious users to perform SQL injection or cross site scripting attacks.
The first issue is due to an input validation error in the "index.pl" file when processing specially crafted "QueueID" and "Action" parameters, which may be exploited by attackers to cause arbitrary scripting code to be executed by the user's browser.
The second flaw is due to an error where attachments of incoming emails are opened insecurely in the browser, which may be exploited by attackers to cause arbitrary scripting code to be executed by the user's browser.
The third vulnerability is due to input validation errors in the "index.pl" and "admin/index.pl" files when processing specially crafted "Action", "TicketID" and "ArticleID" parameters, which may be exploited by malicious people to conduct SQL injection attacks.
|