Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%
Get alerts for future matching vulnerabilitiesLog in to subscribe
I. Basic Information for CVE-2020-1772
Vulnerability Information

Have questions about the vulnerability? See if Shenlong's analysis helps!
View Shenlong Deep Dive ↗

Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.

Vulnerability Title
Information Disclosure
Source: NVD (National Vulnerability Database)
Vulnerability Description
It's possible to craft Lost Password requests with wildcards in the Token value, which allows attacker to retrieve valid Token(s), generated by users which already requested new passwords. This issue affects: ((OTRS)) Community Edition 5.0.41 and prior versions, 6.0.26 and prior versions. OTRS: 7.0.15 and prior versions.
Source: NVD (National Vulnerability Database)
CVSS Information
CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:L/A:N
Source: NVD (National Vulnerability Database)
Vulnerability Type
双字符或匹配符号转义处理不恰当
Source: NVD (National Vulnerability Database)
Vulnerability Title
OTRS 信息泄露漏洞
Source: CNNVD (China National Vulnerability Database)
Vulnerability Description
Open-source Ticket Request System(OTRS)是德国OTRS集团的一套开源缺陷跟踪管理系统软件。该软件将电话,邮件等各种渠道提交进来的服务请求归类为不同的队列、服务级别,服务人员通过OTRS系统来跟踪和回复客户。 OTRS Community Edition 5.0.41及之前版本、6.0.26及之前版本和OTRS 7.0.15及之前版本中存在安全漏洞。攻击者可通过创建令牌值中带有通配符的Lost Password请求利用该漏洞检索有效的令牌。
Source: CNNVD (China National Vulnerability Database)
CVSS Information
N/A
Source: CNNVD (China National Vulnerability Database)
Vulnerability Type
N/A
Source: CNNVD (China National Vulnerability Database)
Affected Products
VendorProductAffected VersionsCPESubscribe
OTRS AG((OTRS)) Community Edition 5.0.x ~ 5.0.41 -
OTRS AGOTRS 7.0.x ~ 7.0.15 -
II. Public POCs for CVE-2020-1772
#POC DescriptionSource LinkShenlong Link
AI-Generated POCPremium

No public POC found.

Login to generate AI POC
III. Intelligence Information for CVE-2020-1772
Please Login to view more intelligence information
IV. Related Vulnerabilities
V. Comments for CVE-2020-1772

No comments yet


Leave a comment