294 lines
14 KiB
JSON
294 lines
14 KiB
JSON
{
|
||
"Definition": [
|
||
{
|
||
"ID": "oval:org.altlinux.errata:def:20213039",
|
||
"Version": "oval:org.altlinux.errata:def:20213039",
|
||
"Class": "patch",
|
||
"Metadata": {
|
||
"Title": "ALT-PU-2021-3039: package `otrs` update to version 6.0.36-alt1",
|
||
"AffectedList": [
|
||
{
|
||
"Family": "unix",
|
||
"Platforms": [
|
||
"ALT Linux branch c10f1"
|
||
],
|
||
"Products": [
|
||
"ALT SP Workstation",
|
||
"ALT SP Server"
|
||
]
|
||
}
|
||
],
|
||
"References": [
|
||
{
|
||
"RefID": "ALT-PU-2021-3039",
|
||
"RefURL": "https://errata.altlinux.org/ALT-PU-2021-3039",
|
||
"Source": "ALTPU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2021-04651",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2021-04651",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2022-01681",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2022-01681",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2022-05546",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2022-05546",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2022-05547",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2022-05547",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "CVE-2021-21435",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2021-21435",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2021-21439",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2021-21439",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2021-21443",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2021-21443",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2021-36091",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2021-36091",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2021-36092",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2021-36092",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2022-39049",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2022-39049",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2022-39050",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2022-39050",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2022-39051",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2022-39051",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2022-39052",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2022-39052",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2022-4427",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2022-4427",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2023-1248",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2023-1248",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2023-1250",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2023-1250",
|
||
"Source": "CVE"
|
||
}
|
||
],
|
||
"Description": "This update upgrades otrs to version 6.0.36-alt1. \nSecurity Fix(es):\n\n * BDU:2021-04651: Уязвимость системы запроса билетов OTRS, связанная с недостатками в обработке исключительных состояний, позволяющая нарушителю вызвать отказ в обслуживании\n\n * BDU:2022-01681: Уязвимость системы запроса билетов OTRS, связанная с ошибками обработки разрешений, позволяющая нарушителю получить доступ к конфиденциальным данным\n\n * BDU:2022-05546: Уязвимость системы запроса билетов OTRS, связанная с непринятием мер по защите структуры веб-страницы, позволяющая нарушителю провести атаку межсайтового скриптинга (XSS)\n\n * BDU:2022-05547: Уязвимость интерфейса администратора системы запроса билетов OTRS, связанная с непринятием мер по защите структуры веб-страницы, позволяющая нарушителю провести атаку межсайтового скриптинга (XSS)\n\n * CVE-2021-21435: Article Bcc fields and agent personal information are shown when customer prints the ticket (PDF) via external interface. This issue affects: OTRS AG OTRS 7.0.x version 7.0.23 and prior versions; 8.0.x version 8.0.10 and prior versions.\n\n * CVE-2021-21439: DoS attack can be performed when an email contains specially designed URL in the body. It can lead to the high CPU usage and cause low quality of service, or in extreme case bring the system to a halt. This issue affects: OTRS AG ((OTRS)) Community Edition 6.0.x version 6.0.1 and later versions. OTRS AG OTRS 7.0.x version 7.0.26 and prior versions; 8.0.x version 8.0.13 and prior versions.\n\n * CVE-2021-21443: Agents are able to list customer user emails without required permissions in the bulk action screen. This issue affects: OTRS AG ((OTRS)) Community Edition: 6.0.x version 6.0.1 and later versions. OTRS AG OTRS: 7.0.x versions prior to 7.0.27.\n\n * CVE-2021-36091: Agents are able to list appointments in the calendars without required permissions. This issue affects: OTRS AG ((OTRS)) Community Edition: 6.0.x version 6.0.1 and later versions. OTRS AG OTRS: 7.0.x versions prior to 7.0.27.\n\n * CVE-2021-36092: It's possible to create an email which contains specially crafted link and it can be used to perform XSS attack. This issue affects: OTRS AG ((OTRS)) Community Edition:6.0.x version 6.0.1 and later versions. OTRS AG OTRS: 7.0.x version 7.0.27 and prior versions; 8.0.x version 8.0.14 and prior versions.\n\n * CVE-2022-39049: An attacker who is logged into OTRS as an admin user may manipulate the URL to cause execution of JavaScript in the context of OTRS.\n\n * CVE-2022-39050: An attacker who is logged into OTRS as an admin user may manipulate customer URL field to store JavaScript code to be run later by any other agent when clicking the customer URL link. Then the stored JavaScript is executed in the context of OTRS. The same issue applies for the usage of external data sources e.g. database or ldap\n\n * CVE-2022-39051: Attacker might be able to execute malicious Perl code in the Template toolkit, by having the admin installing an unverified 3th party package\n\n * CVE-2022-39052: An external attacker is able to send a specially crafted email (with many recipients) and trigger a potential DoS of the system\n\n * CVE-2022-4427: Improper Input Validation vulnerability in OTRS AG OTRS, OTRS AG ((OTRS)) Community Edition allows SQL Injection via TicketSearch Webservice\nThis issue affects OTRS: from 7.0.1 before 7.0.40 Patch 1, from 8.0.1 before 8.0.28 Patch 1; ((OTRS)) Community Edition: from 6.0.1 through 6.0.34.\n\n\n\n * CVE-2023-1248: Improper Input Validation vulnerability in OTRS AG OTRS (Ticket Actions modules), OTRS AG ((OTRS)) Community Edition (Ticket Actions modules) allows Cross-Site Scripting (XSS).This issue affects OTRS: from 7.0.X before 7.0.42; ((OTRS)) Community Edition: from 6.0.1 through 6.0.34.\n\n\n\n * CVE-2023-1250: Improper Input Validation vulnerability in OTRS AG OTRS (ACL modules), OTRS AG ((OTRS)) Community Edition (ACL modules) allows Local Execution of Code. When creating/importing an ACL it was possible to inject code that gets executed via manipulated comments and ACL-names\nThis issue affects OTRS: from 7.0.X before 7.0.42, from 8.0.X before 8.0.31; ((OTRS)) Community Edition: from 6.0.1 through 6.0.34.\n\n",
|
||
"Advisory": {
|
||
"From": "errata.altlinux.org",
|
||
"Severity": "Critical",
|
||
"Rights": "Copyright 2024 BaseALT Ltd.",
|
||
"Issued": {
|
||
"Date": "2021-10-14"
|
||
},
|
||
"Updated": {
|
||
"Date": "2021-10-14"
|
||
},
|
||
"BDUs": [
|
||
{
|
||
"ID": "BDU:2021-04651",
|
||
"CVSS": "AV:N/AC:M/Au:N/C:N/I:N/A:P",
|
||
"CVSS3": "AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
|
||
"CWE": "CWE-755",
|
||
"Href": "https://bdu.fstec.ru/vul/2021-04651",
|
||
"Impact": "Low",
|
||
"Public": "20201229"
|
||
},
|
||
{
|
||
"ID": "BDU:2022-01681",
|
||
"CVSS": "AV:N/AC:L/Au:S/C:P/I:N/A:N",
|
||
"CVSS3": "AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N",
|
||
"CWE": "CWE-275",
|
||
"Href": "https://bdu.fstec.ru/vul/2022-01681",
|
||
"Impact": "Low",
|
||
"Public": "20210726"
|
||
},
|
||
{
|
||
"ID": "BDU:2022-05546",
|
||
"CVSS": "AV:N/AC:L/Au:S/C:P/I:P/A:N",
|
||
"CVSS3": "AV:N/AC:L/PR:L/UI:R/S:U/C:L/I:L/A:N",
|
||
"CWE": "CWE-79",
|
||
"Href": "https://bdu.fstec.ru/vul/2022-05546",
|
||
"Impact": "Low",
|
||
"Public": "20220905"
|
||
},
|
||
{
|
||
"ID": "BDU:2022-05547",
|
||
"CVSS": "AV:N/AC:L/Au:S/C:P/I:P/A:N",
|
||
"CVSS3": "AV:N/AC:L/PR:L/UI:R/S:U/C:L/I:L/A:N",
|
||
"CWE": "CWE-79",
|
||
"Href": "https://bdu.fstec.ru/vul/2022-05547",
|
||
"Impact": "Low",
|
||
"Public": "20220905"
|
||
}
|
||
],
|
||
"CVEs": [
|
||
{
|
||
"ID": "CVE-2021-21435",
|
||
"CVSS": "AV:N/AC:M/Au:N/C:P/I:N/A:N",
|
||
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N",
|
||
"CWE": "CWE-200",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2021-21435",
|
||
"Impact": "Low",
|
||
"Public": "20210208"
|
||
},
|
||
{
|
||
"ID": "CVE-2021-21439",
|
||
"CVSS": "AV:N/AC:M/Au:N/C:N/I:N/A:P",
|
||
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
|
||
"CWE": "CWE-755",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2021-21439",
|
||
"Impact": "Low",
|
||
"Public": "20210614"
|
||
},
|
||
{
|
||
"ID": "CVE-2021-21443",
|
||
"CVSS": "AV:N/AC:L/Au:S/C:P/I:N/A:N",
|
||
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N",
|
||
"CWE": "NVD-CWE-noinfo",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2021-21443",
|
||
"Impact": "Low",
|
||
"Public": "20210726"
|
||
},
|
||
{
|
||
"ID": "CVE-2021-36091",
|
||
"CVSS": "AV:N/AC:L/Au:S/C:P/I:N/A:N",
|
||
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N",
|
||
"CWE": "CWE-863",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2021-36091",
|
||
"Impact": "Low",
|
||
"Public": "20210726"
|
||
},
|
||
{
|
||
"ID": "CVE-2021-36092",
|
||
"CVSS": "AV:N/AC:M/Au:N/C:N/I:P/A:N",
|
||
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
|
||
"CWE": "CWE-79",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2021-36092",
|
||
"Impact": "Low",
|
||
"Public": "20210726"
|
||
},
|
||
{
|
||
"ID": "CVE-2022-39049",
|
||
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N",
|
||
"CWE": "CWE-79",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2022-39049",
|
||
"Impact": "Low",
|
||
"Public": "20220905"
|
||
},
|
||
{
|
||
"ID": "CVE-2022-39050",
|
||
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N",
|
||
"CWE": "CWE-79",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2022-39050",
|
||
"Impact": "Low",
|
||
"Public": "20220905"
|
||
},
|
||
{
|
||
"ID": "CVE-2022-39051",
|
||
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
|
||
"CWE": "CWE-913",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2022-39051",
|
||
"Impact": "High",
|
||
"Public": "20220905"
|
||
},
|
||
{
|
||
"ID": "CVE-2022-39052",
|
||
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
|
||
"CWE": "CWE-835",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2022-39052",
|
||
"Impact": "Low",
|
||
"Public": "20221017"
|
||
},
|
||
{
|
||
"ID": "CVE-2022-4427",
|
||
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
|
||
"CWE": "CWE-89",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2022-4427",
|
||
"Impact": "Critical",
|
||
"Public": "20221219"
|
||
},
|
||
{
|
||
"ID": "CVE-2023-1248",
|
||
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
|
||
"CWE": "CWE-79",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2023-1248",
|
||
"Impact": "Low",
|
||
"Public": "20230320"
|
||
},
|
||
{
|
||
"ID": "CVE-2023-1250",
|
||
"CVSS3": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
|
||
"CWE": "CWE-94",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2023-1250",
|
||
"Impact": "High",
|
||
"Public": "20230320"
|
||
}
|
||
],
|
||
"AffectedCPEs": {
|
||
"CPEs": [
|
||
"cpe:/o:alt:spworkstation:10",
|
||
"cpe:/o:alt:spserver:10"
|
||
]
|
||
}
|
||
}
|
||
},
|
||
"Criteria": {
|
||
"Operator": "AND",
|
||
"Criterions": [
|
||
{
|
||
"TestRef": "oval:org.altlinux.errata:tst:4001",
|
||
"Comment": "ALT Linux must be installed"
|
||
}
|
||
],
|
||
"Criterias": [
|
||
{
|
||
"Operator": "OR",
|
||
"Criterions": [
|
||
{
|
||
"TestRef": "oval:org.altlinux.errata:tst:20213039001",
|
||
"Comment": "otrs is earlier than 0:6.0.36-alt1"
|
||
},
|
||
{
|
||
"TestRef": "oval:org.altlinux.errata:tst:20213039002",
|
||
"Comment": "otrs-apache2 is earlier than 0:6.0.36-alt1"
|
||
}
|
||
]
|
||
}
|
||
]
|
||
}
|
||
}
|
||
]
|
||
} |