Skip to content

OTRS administrators can configure dynamic field and...

Moderate severity Unreviewed Published Feb 8, 2022 to the GitHub Advisory Database • Updated Feb 3, 2023

Package

No package listedSuggest a package

Affected versions

Unknown

Patched versions

Unknown

Description

OTRS administrators can configure dynamic field and inject malicious JavaScript code in the error message of the regular expression check. When used in the agent interface, malicious code might be exectued in the browser. This issue affects: OTRS AG OTRS 7.0.x version: 7.0.31 and prior versions.

References

Published by the National Vulnerability Database Feb 7, 2022
Published to the GitHub Advisory Database Feb 8, 2022
Last updated Feb 3, 2023

Severity

Moderate

EPSS score

0.054%
(26th percentile)

Weaknesses

CVE ID

CVE-2022-0473

GHSA ID

GHSA-j2qj-f5h6-7m56

Source code

No known source code

Dependabot alerts are not supported on this advisory because it does not have a package from a supported ecosystem with an affected and fixed version.

Learn more about GitHub language support

Loading Checking history
See something to contribute? Suggest improvements for this vulnerability.