ID CVE-2008-7281 Type cve Reporter cve@mitre.org Modified 2011-03-22T04:00:00
Description
Open Ticket Request System (OTRS) before 2.2.7 sends e-mail containing a Bcc header field that lists the Blind Carbon Copy recipients, which allows remote attackers to obtain potentially sensitive e-mail address information by reading this field.
{"openvas": [{"lastseen": "2019-10-18T15:29:05", "bulletinFamily": "scanner", "description": "This host is installed with OTRS (Open Ticket Request System) and is prone to\nmultiple vulnerabilities.", "modified": "2019-10-17T00:00:00", "published": "2013-09-17T00:00:00", "id": "OPENVAS:1361412562310803915", "href": "http://plugins.openvas.org/nasl.php?oid=1361412562310803915", "title": "OTRS Email Multiple Vulnerabilities", "type": "openvas", "sourceData": "###############################################################################\n# OpenVAS Vulnerability Test\n#\n# OTRS Email Multiple Vulnerabilities\n#\n# Authors:\n# Shashi Kiran N <nskiran@secpod.com>\n#\n# Copyright:\n# Copyright (c) 2013 Greenbone Networks GmbH\n#\n# This program is free software; you can redistribute it and/or modify\n# it under the terms of the GNU General Public License version 2\n# (or any later version), as published by the Free Software Foundation.\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n###############################################################################\nCPE = \"cpe:/a:otrs:otrs\";\n\nif(description)\n{\n script_oid(\"1.3.6.1.4.1.25623.1.0.803915\");\n script_version(\"2019-10-17T12:29:45+0000\");\n script_cve_id(\"CVE-2008-7280\", \"CVE-2008-7281\");\n script_tag(name:\"cvss_base\", value:\"5.0\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:N/AC:L/Au:N/C:N/I:N/A:P\");\n script_tag(name:\"last_modification\", value:\"2019-10-17 12:29:45 +0000 (Thu, 17 Oct 2019)\");\n script_tag(name:\"creation_date\", value:\"2013-09-17 16:43:34 +0530 (Tue, 17 Sep 2013)\");\n script_name(\"OTRS Email Multiple Vulnerabilities\");\n\n\n script_tag(name:\"summary\", value:\"This host is installed with OTRS (Open Ticket Request System) and is prone to\nmultiple vulnerabilities.\");\n script_tag(name:\"vuldetect\", value:\"Checks if a vulnerable version is present on the target host.\");\n script_tag(name:\"solution\", value:\"Upgrade to OTRS (Open Ticket Request System) version 2.2.7 or later.\");\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n script_tag(name:\"insight\", value:\"-An error exists in Kernel/System/EmailParser.pm in PostmasterPOP3.pl which\ndoes not properly handle e-mail messages containing malformed UTF-8 characters\n\n - An error exists in otrs-email.pm, which sends e-mail containing a Bcc header\nfield that lists the Blind Carbon Copy recipients\");\n script_tag(name:\"affected\", value:\"OTRS (Open Ticket Request System) version before 2.2.7\");\n script_tag(name:\"impact\", value:\"Successful exploitation will allow remote attackers to obtain potentially\nsensitive e-mail address information or cause the application to crash by\ncreating a denial of service condition.\");\n script_category(ACT_GATHER_INFO);\n script_tag(name:\"qod_type\", value:\"remote_banner\");\n script_family(\"Web application abuses\");\n script_copyright(\"This script is Copyright (C) 2013 Greenbone Networks GmbH\");\n script_dependencies(\"secpod_otrs_detect.nasl\");\n script_require_ports(\"Services/www\", 80);\n script_mandatory_keys(\"OTRS/installed\");\n script_xref(name:\"URL\", value:\"http://www.otrs.com/en/\");\n exit(0);\n}\n\n\ninclude(\"version_func.inc\");\ninclude(\"host_details.inc\");\n\nif(!port = get_app_port(cpe:CPE)){\n exit(0);\n}\n\nif(vers = get_app_version(cpe:CPE, port:port))\n{\n if(version_is_less(version: vers, test_version: \"2.2.7\"))\n {\n security_message(port:port);\n exit(0);\n }\n\n}\n", "cvss": {"score": 5.0, "vector": "AV:N/AC:L/Au:N/C:N/I:N/A:P"}}]}