Name | CVE-2020-1773 |
Description | An attacker with the ability to generate session IDs or password reset tokens, either by being able to authenticate or by exploiting OSA-2020-09, may be able to predict other users session IDs, password reset tokens and automatically generated passwords. This issue affects ((OTRS)) Community Edition: 5.0.41 and prior versions, 6.0.26 and prior versions. OTRS; 7.0.15 and prior versions. |
Source | CVE (at NVD; CERT, LWN, oss-sec, fulldisc, Red Hat, Ubuntu, Gentoo, SUSE bugzilla/CVE, GitHub advisories/code/issues, web search, more) |
References | DLA-3551-1 |
Vulnerable and fixed packages
The table below lists information on source packages.
Source Package | Release | Version | Status |
---|
otrs2 (PTS) | jessie, jessie (lts) | 3.3.18-1+deb8u15 | vulnerable |
| stretch/non-free (security), stretch/non-free (lts), stretch/non-free | 5.0.16-1+deb9u6 | vulnerable |
| buster/non-free (security), buster/non-free | 6.0.16-2+deb10u1 | fixed |
| bullseye/non-free | 6.0.32-6 | fixed |
The information below is based on the following data on fixed versions.
Package | Type | Release | Fixed Version | Urgency | Origin | Debian Bugs |
---|
otrs2 | source | wheezy | (unfixed) | end-of-life | | |
otrs2 | source | buster | 6.0.16-2+deb10u1 | | DLA-3551-1 | |
otrs2 | source | (unstable) | 6.0.27-1 | | | |
Notes
[stretch] - otrs2 <ignored> (Non-free not supported)
[jessie] - otrs2 <no-dsa> (Too intrusive to backport)
https://otrs.com/release-notes/otrs-security-advisory-2020-10/
Fixed in 7.0.16, 6.0.27, 5.0.42
OTRS6: https://github.com/OTRS/otrs/commit/ab253734bc211541309b9f8ea2b8b70389c4a64e
OTRS5: https://github.com/OTRS/otrs/commit/4955521af50238046847bce51ad9865950324f77