{"dataType":"CVE_RECORD","dataVersion":"5.1","cveMetadata":{"state":"PUBLISHED","cveId":"CVE-2020-1774","assignerOrgId":"2e1bf29f-dc29-4ed8-830c-7b9348b6f0e8","assignerShortName":"OTRS","dateUpdated":"2024-09-16T18:13:37.691Z","dateReserved":"2019-11-29T00:00:00.000Z","datePublished":"2020-04-28T13:54:26.180Z"},"containers":{"cna":{"title":"Information disclosure","datePublic":"2020-04-27T00:00:00.000Z","providerMetadata":{"orgId":"2e1bf29f-dc29-4ed8-830c-7b9348b6f0e8","shortName":"OTRS","dateUpdated":"2023-08-31T02:07:06.193Z"},"descriptions":[{"lang":"en","value":"When user downloads PGP or S/MIME keys/certificates, exported file has same name for private and public keys. Therefore it's possible to mix them and to send private key to the third-party instead of public key. This issue affects ((OTRS)) Community Edition: 5.0.42 and prior versions, 6.0.27 and prior versions. OTRS: 7.0.16 and prior versions."}],"affected":[{"vendor":"OTRS AG","product":"((OTRS)) Community Edition","versions":[{"version":"6.0.x <= 6.0.27","status":"affected"},{"version":"5.0.x <= 5.0.42","status":"affected"}]},{"vendor":"OTRS AG","product":"OTRS","versions":[{"version":"7.0.x <= 7.0.16","status":"affected"}]}],"references":[{"url":"https://otrs.com/release-notes/otrs-security-advisory-2020-11/"},{"name":"[debian-lts-announce] 20200501 [SECURITY] [DLA 2198-1] otrs2 security update","tags":["mailing-list"],"url":"https://lists.debian.org/debian-lts-announce/2020/05/msg00000.html"},{"name":"[debian-lts-announce] 20230831 [SECURITY] [DLA 3551-1] otrs2 security update","tags":["mailing-list"],"url":"https://lists.debian.org/debian-lts-announce/2023/08/msg00040.html"}],"credits":[{"lang":"en","value":"Matthias Terlinde"}],"metrics":[{"cvssV3_1":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:U/C:H/I:N/A:N","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"HIGH","userInteraction":"REQUIRED","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"NONE","availabilityImpact":"NONE","baseScore":4.5,"baseSeverity":"MEDIUM"}}],"problemTypes":[{"descriptions":[{"type":"CWE","lang":"en","description":"CWE-201 Information Exposure Through Sent Data","cweId":"CWE-201"}]}],"x_generator":{"engine":"Vulnogram 0.0.9"},"source":{"advisory":"OSA-2020-11","defect":["2020021442001602"],"discovery":"USER"},"solutions":[{"lang":"en","value":"Upgrade to OTRS 7.0.17, ((OTRS)) Community Edition 6.0.28\nPatch for ((OTRS)) Community Edition 6: https://github.com/OTRS/otrs/commit/ff725cbea77f03fa296bb13f93f5b07086920342\nPatch for ((OTRS)) Community Edition 5: https://github.com/OTRS/otrs/commit/fb0e6131e79aa2ba9c7acbd16f4ee4e73289f64b"}]},"adp":[{"providerMetadata":{"orgId":"af854a3a-2127-422b-91ae-364da2661108","shortName":"CVE","dateUpdated":"2024-08-04T06:46:30.951Z"},"title":"CVE Program Container","references":[{"url":"https://otrs.com/release-notes/otrs-security-advisory-2020-11/","tags":["x_transferred"]},{"name":"[debian-lts-announce] 20200501 [SECURITY] [DLA 2198-1] otrs2 security update","tags":["mailing-list","x_transferred"],"url":"https://lists.debian.org/debian-lts-announce/2020/05/msg00000.html"},{"name":"[debian-lts-announce] 20230831 [SECURITY] [DLA 3551-1] otrs2 security update","tags":["mailing-list","x_transferred"],"url":"https://lists.debian.org/debian-lts-announce/2023/08/msg00040.html"}]}]}}