190 lines
9.1 KiB
JSON
190 lines
9.1 KiB
JSON
{
|
||
"Definition": [
|
||
{
|
||
"ID": "oval:org.altlinux.errata:def:20141279",
|
||
"Version": "oval:org.altlinux.errata:def:20141279",
|
||
"Class": "patch",
|
||
"Metadata": {
|
||
"Title": "ALT-PU-2014-1279: package `otrs` update to version 3.3.5-alt1",
|
||
"AffectedList": [
|
||
{
|
||
"Family": "unix",
|
||
"Platforms": [
|
||
"ALT Linux branch c9f2"
|
||
],
|
||
"Products": [
|
||
"ALT SPWorkstation",
|
||
"ALT SPServer"
|
||
]
|
||
}
|
||
],
|
||
"References": [
|
||
{
|
||
"RefID": "ALT-PU-2014-1279",
|
||
"RefURL": "https://errata.altlinux.org/ALT-PU-2014-1279",
|
||
"Source": "ALTPU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2022-01771",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2022-01771",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "CVE-2013-3551",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2013-3551",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2013-4088",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2013-4088",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2013-4717",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2013-4717",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2013-4718",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2013-4718",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2014-1471",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2014-1471",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2014-1694",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2014-1694",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2014-1695",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2014-1695",
|
||
"Source": "CVE"
|
||
}
|
||
],
|
||
"Description": "This update upgrades otrs to version 3.3.5-alt1. \nSecurity Fix(es):\n\n * BDU:2022-01771: Уязвимость компонентов Kernel/Output/HTML/PreferencesCustomQueue.pm, Kernel/System/CustomerCompany.pm, Kernel/System/Ticket/IndexAccelerator/RuntimeDB.pm, Kernel/System/Ticket/IndexAccelerator/StaticDB.pm, Kernel/System/TicketSearch.pm системы запроса билетов OTRS, позволяющая нарушителю получить доступ к конфиденциальным данным, нарушить их целостность, а также вызвать отказ в обслуживании\n\n * CVE-2013-3551: Kernel/Modules/AgentTicketPhone.pm in Open Ticket Request System (OTRS) 3.0.x before 3.0.20, 3.1.x before 3.1.16, and 3.2.x before 3.2.7, and OTRS ITSM 3.0.x before 3.0.8, 3.1.x before 3.1.9, and 3.2.x before 3.2.5 does not properly restrict tickets, which allows remote attackers with a valid agent login to read restricted tickets via a crafted URL involving the ticket split mechanism.\n\n * CVE-2013-4088: Kernel/Modules/AgentTicketWatcher.pm in Open Ticket Request System (OTRS) 3.0.x before 3.0.21, 3.1.x before 3.1.17, and 3.2.x before 3.2.8 does not properly restrict tickets, which allows remote attackers with a valid agent login to read restricted tickets via a crafted URL involving the ticket split mechanism.\n\n * CVE-2013-4717: Multiple SQL injection vulnerabilities in Open Ticket Request System (OTRS) Help Desk 3.0.x before 3.0.22, 3.1.x before 3.1.18, and 3.2.x before 3.2.9 allow remote authenticated users to execute arbitrary SQL commands via unspecified vectors related to Kernel/Output/HTML/PreferencesCustomQueue.pm, Kernel/System/CustomerCompany.pm, Kernel/System/Ticket/IndexAccelerator/RuntimeDB.pm, Kernel/System/Ticket/IndexAccelerator/StaticDB.pm, and Kernel/System/TicketSearch.pm.\n\n * CVE-2013-4718: Cross-site scripting (XSS) vulnerability in Open Ticket Request System (OTRS) ITSM 3.0.x before 3.0.9, 3.1.x before 3.1.10, and 3.2.x before 3.2.7 allows remote authenticated users to inject arbitrary web script or HTML via an ITSM ConfigItem search.\n\n * CVE-2014-1471: SQL injection vulnerability in the StateGetStatesByType function in Kernel/System/State.pm in Open Ticket Request System (OTRS) 3.1.x before 3.1.19, 3.2.x before 3.2.14, and 3.3.x before 3.3.4 allows remote attackers to execute arbitrary SQL commands via vectors related to a ticket search URL.\n\n * CVE-2014-1694: Multiple cross-site request forgery (CSRF) vulnerabilities in (1) CustomerPreferences.pm, (2) CustomerTicketMessage.pm, (3) CustomerTicketProcess.pm, and (4) CustomerTicketZoom.pm in Kernel/Modules/ in Open Ticket Request System (OTRS) 3.1.x before 3.1.19, 3.2.x before 3.2.14, and 3.3.x before 3.3.4 allow remote attackers to hijack the authentication of arbitrary users for requests that (5) create tickets or (6) send follow-ups to existing tickets.\n\n * CVE-2014-1695: Cross-site scripting (XSS) vulnerability in Open Ticket Request System (OTRS) 3.1.x before 3.1.20, 3.2.x before 3.2.15, and 3.3.x before 3.3.5 allows remote attackers to inject arbitrary web script or HTML via a crafted HTML email.",
|
||
"Advisory": {
|
||
"From": "errata.altlinux.org",
|
||
"Severity": "High",
|
||
"Rights": "Copyright 2024 BaseALT Ltd.",
|
||
"Issued": {
|
||
"Date": "2014-03-12"
|
||
},
|
||
"Updated": {
|
||
"Date": "2014-03-12"
|
||
},
|
||
"BDUs": [
|
||
{
|
||
"ID": "BDU:2022-01771",
|
||
"CVSS": "AV:N/AC:L/Au:S/C:C/I:C/A:C",
|
||
"CVSS3": "AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
|
||
"CWE": "CWE-89",
|
||
"Href": "https://bdu.fstec.ru/vul/2022-01771",
|
||
"Impact": "High",
|
||
"Public": "20130625"
|
||
}
|
||
],
|
||
"CVEs": [
|
||
{
|
||
"ID": "CVE-2013-3551",
|
||
"CVSS": "AV:N/AC:L/Au:S/C:P/I:N/A:N",
|
||
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
|
||
"CWE": "CWE-200",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2013-3551",
|
||
"Impact": "Low",
|
||
"Public": "20200221"
|
||
},
|
||
{
|
||
"ID": "CVE-2013-4088",
|
||
"CVSS": "AV:N/AC:L/Au:S/C:P/I:N/A:N",
|
||
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
|
||
"CWE": "CWE-200",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2013-4088",
|
||
"Impact": "Low",
|
||
"Public": "20200221"
|
||
},
|
||
{
|
||
"ID": "CVE-2013-4717",
|
||
"CVSS": "AV:N/AC:L/Au:S/C:P/I:P/A:P",
|
||
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
|
||
"CWE": "CWE-89",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2013-4717",
|
||
"Impact": "High",
|
||
"Public": "20210809"
|
||
},
|
||
{
|
||
"ID": "CVE-2013-4718",
|
||
"CVSS": "AV:N/AC:M/Au:S/C:N/I:P/A:N",
|
||
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N",
|
||
"CWE": "CWE-79",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2013-4718",
|
||
"Impact": "Low",
|
||
"Public": "20210809"
|
||
},
|
||
{
|
||
"ID": "CVE-2014-1471",
|
||
"CVSS": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
|
||
"CWE": "CWE-89",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2014-1471",
|
||
"Impact": "High",
|
||
"Public": "20140204"
|
||
},
|
||
{
|
||
"ID": "CVE-2014-1694",
|
||
"CVSS": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
|
||
"CWE": "CWE-352",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2014-1694",
|
||
"Impact": "Low",
|
||
"Public": "20140204"
|
||
},
|
||
{
|
||
"ID": "CVE-2014-1695",
|
||
"CVSS": "AV:N/AC:M/Au:N/C:N/I:P/A:N",
|
||
"CWE": "CWE-79",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2014-1695",
|
||
"Impact": "Low",
|
||
"Public": "20140301"
|
||
}
|
||
],
|
||
"AffectedCPEs": {
|
||
"CPEs": [
|
||
"cpe:/o:alt:spworkstation:8.4",
|
||
"cpe:/o:alt:spserver:8.4"
|
||
]
|
||
}
|
||
}
|
||
},
|
||
"Criteria": {
|
||
"Operator": "AND",
|
||
"Criterions": [
|
||
{
|
||
"TestRef": "oval:org.altlinux.errata:tst:3001",
|
||
"Comment": "ALT Linux must be installed"
|
||
}
|
||
],
|
||
"Criterias": [
|
||
{
|
||
"Operator": "OR",
|
||
"Criterions": [
|
||
{
|
||
"TestRef": "oval:org.altlinux.errata:tst:20141279001",
|
||
"Comment": "otrs is earlier than 0:3.3.5-alt1"
|
||
},
|
||
{
|
||
"TestRef": "oval:org.altlinux.errata:tst:20141279002",
|
||
"Comment": "otrs-apache2 is earlier than 0:3.3.5-alt1"
|
||
},
|
||
{
|
||
"TestRef": "oval:org.altlinux.errata:tst:20141279003",
|
||
"Comment": "otrs-doc-admin-en-pdf is earlier than 0:3.3.5-alt1"
|
||
}
|
||
]
|
||
}
|
||
]
|
||
}
|
||
}
|
||
]
|
||
} |