OTRS ITSM / FAQ Module Security Bypass and Script Insertion Vulnerabilities


Description   Two vulnerabilities have been reported in OTRS ITSM and the FAQ module for OTRS, which can be exploited by malicious users to bypass certain security restrictions and conduct script insertion attacks.
1) An error in the object linking mechanism can be exploited to view otherwise restricted ticket titles and objects or place and remove links to objects.
For more information:
SA52969
2) Certain unspecified input passed to changes, workorder items, or FAQ articles is not properly sanitised before being displayed to the user. This can be exploited to insert arbitrary HTML and script code, which will be executed in a user's browser session in context of an affected site when the malicious data is being viewed.
Successful exploitation of this vulnerability requires permission to write changes, workorder items, or FAQ articles.
The vulnerabilities are reported in the following products and versions.
* OTRS ITSM versions prior to 3.2.3, 3.1.8, and 3.0.7
* FAQ module for OTRS versions prior to 2.2.3, 2.1.4, and 2.0.8.
     
Vulnerable Products   Vulnerable Software:
FAQ (module for OTRS) 2.xOTRS ITSM 3.x
     
Solution   Update to a fixed version.OTRS ITSM:Update to version 3.2.3, 3.1.8, or 3.0.7FAQ module for OTRS:Update to version 2.2.3, 2.1.4, or 2.0.8
     
CVE   CVE-2013-2637
CVE-2013-2625
     
References   http://www.otrs.com/en/open-source/community-news/security-advisories/security-advisory-2013-01/
http://www.otrs.com/en/open-source/community-news/security-advisories/security-advisory-2013-02/
Luigi Vezzoso:
http://www.exploit-db.com/exploits/24922/
     
Vulnerability Manager Detection   No
     
IPS Protection  
ASQ Engine alarm Available Since
XSS - Prevention - POST : suspicious tag with event found in data
3.2.0
XSS - Prevention - POST : suspicious 'meta' tag found in data
3.2.0
XSS - Prevention - POST : suspicious 'object' tag found in data
3.2.0
XSS - Prevention - POST : suspicious 'applet' tag found in data
3.2.0
XSS - Prevention - POST : 'location' javascript object found in data
3.2.0
XSS - Prevention - POST : javascript code found in data
3.2.0
XSS - Prevention - POST : suspicious 'iframe' tag found in data
3.2.0
XSS - Prevention - POST : code allowing cookie access found in data
3.2.0
XSS - Prevention - POST : suspicious 'img' attribute found in data
3.2.0
XSS - Prevention - POST : suspicious 'embed' tag found in data
3.2.0
XSS - Prevention - POST : suspicious 'style' tag found in data
3.2.0
XSS - Prevention - POST : suspicious 'div' tag found in data
3.2.0
XSS - Prevention - POST : 'script' tag found in data
3.2.0
XSS - Prevention - POST : suspicious 'style' attribute found in data
3.2.0
XSS - Prevention - POST : suspicious 'style' tag found in data
5.0.0
XSS - Prevention - POST : javascript code found in data
5.0.0
XSS - Prevention - POST : suspicious tag with event found in data
5.0.0
XSS - Prevention - POST : suspicious 'embed' tag found in data
5.0.0
XSS - Prevention - POST : 'location' javascript object found in data
5.0.0
XSS - Prevention - POST : code allowing cookie access found in data
5.0.0
XSS - Prevention - POST : 'script' tag found in data
5.0.0
XSS - Prevention - POST : suspicious 'style' attribute found in data
5.0.0
XSS - Prevention - POST : suspicious 'applet' tag found in data
5.0.0
XSS - Prevention - POST : suspicious 'div' tag found in data
5.0.0
XSS - Prevention - POST : suspicious 'img' attribute found in data
5.0.0
XSS - Prevention - POST : suspicious 'meta' tag found in data
5.0.0
XSS - Prevention - POST : suspicious 'object' tag found in data
5.0.0
XSS - Prevention - POST : suspicious 'iframe' tag found in data
5.0.0
     


 
 
 
 
 Risk level 
Low 

 Vulnerability First Public Report Date 
2013-04-08 

 Target Type 
Server 

 Possible exploit 
Remote