CVE-2020-1772Improper Neutralization of Wildcards or Matching Symbols in AG Community Edition

Severity
7.5HIGHNVD
CNA6.5
EPSS
0.4%
top 36.36%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedMar 27
Latest updateMay 24

Description

It's possible to craft Lost Password requests with wildcards in the Token value, which allows attacker to retrieve valid Token(s), generated by users which already requested new passwords. This issue affects: ((OTRS)) Community Edition 5.0.41 and prior versions, 6.0.26 and prior versions. OTRS: 7.0.15 and prior versions.

CVSS vector

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:NExploitability: 3.9 | Impact: 3.6

Affected Packages5 packages

CVEListV5otrs_ag/community_edition5.0.x5.0.41+1
NVDotrs/otrs5.0.05.0.41+2
CVEListV5otrs_ag/otrs7.0.x7.0.15
NVDopensuse/leap15.1, 15.2+1

Also affects: Debian Linux 8.0

Patches

🔴Vulnerability Details

3
GHSA
GHSA-59rf-fq39-rh6x: It's possible to craft Lost Password requests with wildcards in the Token value, which allows attacker to retrieve valid Token(s), generated by users2022-05-24
CVEList
Information Disclosure2020-03-27
OSV
CVE-2020-1772: It's possible to craft Lost Password requests with wildcards in the Token value, which allows attacker to retrieve valid Token(s), generated by users2020-03-27

📋Vendor Advisories

1
Debian
CVE-2020-1772: otrs2 - It's possible to craft Lost Password requests with wildcards in the Token value,...2020
CVE-2020-1772 — Otrs AG Community Edition vulnerability | cvebase