|
Message-ID: <a27e61d789df4aff9f1f1f74cc307281@imshyb02.MITRE.ORG> Date: Tue, 1 Nov 2016 14:15:33 -0400 From: <cve-assign@...re.org> To: <carnil@...ian.org> CC: <cve-assign@...re.org>, <oss-security@...ts.openwall.com> Subject: Re: CVE Request: OTRS: execution of JavaScript in OTRS context by opening malicious attachment -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA256 > Date: 2016-11-01 > https://www.otrs.com/security-advisory-2016-02-security-update-otrs/ > An attacker could trick an authenticated agent or customer into > opening a malicious attachment which could lead to the execution of > JavaScript in OTRS context. Use CVE-2016-9139. - -- CVE Assignment Team M/S M300, 202 Burlington Road, Bedford, MA 01730 USA [ A PGP key is available for encrypted communications at http://cve.mitre.org/cve/request_id.html ] -----BEGIN PGP SIGNATURE----- Version: GnuPG v1 iQIcBAEBCAAGBQJYGNtQAAoJEHb/MwWLVhi2/HkP/2RHPdRmkxzC5t2KT2hb9KWK Jglp7NldyOvcz8Y2KHoXO77vA6rbzShsZPVY6vOmpQPFv/YKvyzdOICWW9kLObao 5Q8O2KHBspIfky6NFlX4busIzBda6FXm1kmqyKNlt9iCMPZXyyo+qMP/rycUAso+ 8TXm2+/lAhSlpKncsfekbFD0ueDtSBsxt2SIjeq6VbAxH8j7RVKktIOTatvJM7iE ZiE+6OWmk4WcgztGZ+tSuqcsG92tmMWfMA6wjioeyFnfX2ngQ7XVZLYaV8aO/+lS aACNhQjPcs1bc0PKJ80p5O9QKmul8dmKZuygZ4GWz/+S5jvA80neNOgAfoGEg2FC xDmqgTaUaoaf/XExrx6tILD7icc3bF6cHWiOtQiPEtoQaNMVBFjMO5n/h5OCg4kT jOQVo+HTfalLg16BToR/I0BS9pJ/pfaUxxj6HWpxNJXjbDmnU9aptl7PWMVrwwVo VCsmf0wwqK46vSbHBK6hYUcEAw1Cir+p3K3oiX32cHP3n2D5xA+cnOTXulEeb86N DZUXk7BT4YznYubPuSLPWGtlPWn0hia3JgCCLVNnHyRsWmKsojk1xzxug+L6P1Lt xw6LwORGSUJ9bFv8YjtztNx7kJsMpoLFapwhGefhxia/NwcZQxAM1tzIIczG0vKZ ZIYWfSRilgv+4xulgEZ+ =GDId -----END PGP SIGNATURE-----
Powered by blists - more mailing lists
Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.
Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.