Show filters
28 Total Results
Displaying 1-10 of 28
Sort by:
Attacker Value
Unknown

CVE-2008-7282

Disclosure Date: March 18, 2011 (last updated October 04, 2023)
Kernel/Output/HTML/CustomerNewTicketQueueSelectionGeneric.pm in Open Ticket Request System (OTRS) before 2.2.6, when the CustomerPanelOwnSelection and CustomerGroupSupport options are enabled, allows remote authenticated users to bypass intended access restrictions, and perform certain (1) list and (2) write operations on queues, via unspecified vectors.
0
Attacker Value
Unknown

CVE-2010-4762

Disclosure Date: March 18, 2011 (last updated October 04, 2023)
Cross-site scripting (XSS) vulnerability in the rich-text-editor component in Open Ticket Request System (OTRS) before 3.0.0-beta2 allows remote authenticated users to inject arbitrary web script or HTML by using the "source code" feature in the customer interface.
0
Attacker Value
Unknown

CVE-2008-7276

Disclosure Date: March 18, 2011 (last updated October 04, 2023)
Kernel/System/Web/Request.pm in Open Ticket Request System (OTRS) before 2.3.2 creates a directory under /tmp/ with 1274 permissions, which might allow local users to bypass intended access restrictions via standard filesystem operations, related to incorrect interpretation of 0700 as a decimal value.
0
Attacker Value
Unknown

CVE-2008-7277

Disclosure Date: March 18, 2011 (last updated October 04, 2023)
Open Ticket Request System (OTRS) before 2.3.0-beta4 checks for the rw permission, instead of the configured merge permission, during authorization of merge operations, which might allow remote authenticated users to bypass intended access restrictions by merging two tickets.
0
Attacker Value
Unknown

CVE-2009-5055

Disclosure Date: March 18, 2011 (last updated October 04, 2023)
Open Ticket Request System (OTRS) before 2.4.4 grants ticket access on the basis of single-digit substrings of the CustomerID value, which allows remote authenticated users to bypass intended access restrictions in opportunistic circumstances by visiting a ticket, as demonstrated by leveraging the CustomerID 12 account to read tickets that should be available only to CustomerID 1 or CustomerID 2.
0
Attacker Value
Unknown

CVE-2010-4761

Disclosure Date: March 18, 2011 (last updated October 04, 2023)
The customer-interface ticket-print dialog in Open Ticket Request System (OTRS) before 3.0.0-beta3 does not properly restrict customer-visible data, which allows remote authenticated users to obtain potentially sensitive information from the (1) responsible, (2) owner, (3) accounted time, (4) pending until, and (5) lock fields by reading this dialog.
0
Attacker Value
Unknown

CVE-2010-4764

Disclosure Date: March 18, 2011 (last updated October 04, 2023)
Open Ticket Request System (OTRS) before 2.4.10, and 3.x before 3.0.3, does not present warnings about incoming encrypted e-mail messages that were based on revoked PGP or GPG keys, which makes it easier for remote attackers to spoof e-mail communication by leveraging a key that has a revocation signature.
0
Attacker Value
Unknown

CVE-2010-4768

Disclosure Date: March 18, 2011 (last updated October 04, 2023)
Open Ticket Request System (OTRS) before 2.3.5 does not properly disable hidden permissions, which allows remote authenticated users to bypass intended queue access restrictions in opportunistic circumstances by visiting a ticket, related to a certain ordering of permission-set and permission-remove operations involving both hidden permissions and other permissions.
0
Attacker Value
Unknown

CVE-2010-4760

Disclosure Date: March 18, 2011 (last updated October 04, 2023)
Open Ticket Request System (OTRS) before 3.0.0-beta6 adds email-notification-ext articles to tickets during processing of event-based notifications, which allows remote authenticated users to obtain potentially sensitive information by reading a ticket.
0
Attacker Value
Unknown

CVE-2010-4758

Disclosure Date: March 18, 2011 (last updated October 04, 2023)
installer.pl in Open Ticket Request System (OTRS) before 3.0.3 has an Inbound Mail Password field that uses the text type, instead of the password type, for its INPUT element, which makes it easier for physically proximate attackers to obtain the password by reading the workstation screen.
0