Unrestricted Upload of File with Dangerous Type Affecting otrs2 package, versions *


Severity

Recommended
low

Based on Debian security rating.

Threat Intelligence

EPSS
0.53% (77th percentile)

Do your applications use this vulnerable package?

In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.

Test your applications

Snyk Learn

Learn about Unrestricted Upload of File with Dangerous Type vulnerabilities in an interactive lesson.

Start learning
  • Snyk IDSNYK-DEBIAN9-OTRS2-344241
  • published4 Mar 2018
  • disclosed4 Mar 2018

Introduced: 4 Mar 2018

CVE-2018-7567  (opens in a new tab)
CWE-434  (opens in a new tab)

How to fix?

There is no fixed version for Debian:9 otrs2.

NVD Description

Note: Versions mentioned in the description apply only to the upstream otrs2 package and not the otrs2 package as distributed by Debian. See How to fix? for Debian:9 relevant fixed versions and status.

In the Admin Package Manager in Open Ticket Request System (OTRS) 5.0.0 through 5.0.24 and 6.0.0 through 6.0.1, authenticated admins are able to exploit a Blind Remote Code Execution vulnerability by loading a crafted opm file with an embedded CodeInstall element to execute a command on the server during package installation. NOTE: the vendor disputes this issue stating "the behaviour is as designed and needed for different packages to be installed", "there is a security warning if the package is not verified by OTRS Group", and "there is the possibility and responsibility of an admin to check packages before installation which is possible as they are not binary.