{"dataType":"CVE_RECORD","dataVersion":"5.1","cveMetadata":{"state":"PUBLISHED","cveId":"CVE-2020-1773","assignerOrgId":"2e1bf29f-dc29-4ed8-830c-7b9348b6f0e8","assignerShortName":"OTRS","dateUpdated":"2024-09-16T23:27:05.434Z","dateReserved":"2019-11-29T00:00:00.000Z","datePublished":"2020-03-27T12:47:49.545Z"},"containers":{"cna":{"title":"Session / Password / Password token leak","datePublic":"2020-03-27T00:00:00.000Z","providerMetadata":{"orgId":"2e1bf29f-dc29-4ed8-830c-7b9348b6f0e8","shortName":"OTRS","dateUpdated":"2023-08-31T02:06:15.836Z"},"descriptions":[{"lang":"en","value":"An attacker with the ability to generate session IDs or password reset tokens, either by being able to authenticate or by exploiting OSA-2020-09, may be able to predict other users session IDs, password reset tokens and automatically generated passwords. This issue affects ((OTRS)) Community Edition: 5.0.41 and prior versions, 6.0.26 and prior versions. OTRS; 7.0.15 and prior versions."}],"affected":[{"vendor":"OTRS AG","product":"((OTRS)) Community Edition","versions":[{"version":"5.0.41 and prior","status":"affected"},{"version":"6.0.26 and prior","status":"affected"}]},{"vendor":"OTRS AG","product":"OTRS","versions":[{"version":"7.0.15 and prior","status":"affected"}]}],"references":[{"url":"https://otrs.com/release-notes/otrs-security-advisory-2020-10/"},{"name":"openSUSE-SU-2020:0551","tags":["vendor-advisory"],"url":"http://lists.opensuse.org/opensuse-security-announce/2020-04/msg00038.html"},{"name":"openSUSE-SU-2020:1475","tags":["vendor-advisory"],"url":"http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00066.html"},{"name":"openSUSE-SU-2020:1509","tags":["vendor-advisory"],"url":"http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00077.html"},{"name":"[debian-lts-announce] 20230831 [SECURITY] [DLA 3551-1] otrs2 security update","tags":["mailing-list"],"url":"https://lists.debian.org/debian-lts-announce/2023/08/msg00040.html"}],"credits":[{"lang":"en","value":"Fabian Henneke"}],"metrics":[{"cvssV3_1":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:N","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"LOW","userInteraction":"REQUIRED","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"HIGH","availabilityImpact":"NONE","baseScore":7.3,"baseSeverity":"HIGH"}}],"problemTypes":[{"descriptions":[{"type":"CWE","lang":"en","description":"CWE-331 Insufficient Entropy","cweId":"CWE-331"}]}],"x_generator":{"engine":"Vulnogram 0.0.9"},"source":{"advisory":"OSA-2020-10","defect":["2020012742001563"],"discovery":"EXTERNAL"},"solutions":[{"lang":"en","value":"Upgrade to OTRS 7.0.16, ((OTRS)) Community Edition 6.0.27, 5.0.42\n\nPatch for ((OTRS)) Community Edition 6: https://github.com/OTRS/otrs/commit/ab253734bc211541309b9f8ea2b8b70389c4a64e\nPatch for ((OTRS)) Community Edition 5: https://github.com/OTRS/otrs/commit/4955521af50238046847bce51ad9865950324f77"}]},"adp":[{"providerMetadata":{"orgId":"af854a3a-2127-422b-91ae-364da2661108","shortName":"CVE","dateUpdated":"2024-08-04T06:46:30.934Z"},"title":"CVE Program Container","references":[{"url":"https://otrs.com/release-notes/otrs-security-advisory-2020-10/","tags":["x_transferred"]},{"name":"openSUSE-SU-2020:0551","tags":["vendor-advisory","x_transferred"],"url":"http://lists.opensuse.org/opensuse-security-announce/2020-04/msg00038.html"},{"name":"openSUSE-SU-2020:1475","tags":["vendor-advisory","x_transferred"],"url":"http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00066.html"},{"name":"openSUSE-SU-2020:1509","tags":["vendor-advisory","x_transferred"],"url":"http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00077.html"},{"name":"[debian-lts-announce] 20230831 [SECURITY] [DLA 3551-1] otrs2 security update","tags":["mailing-list","x_transferred"],"url":"https://lists.debian.org/debian-lts-announce/2023/08/msg00040.html"}]}]}}