Follow @Openwall on Twitter for new release announcements and other news
[<prev] [next>] [<thread-prev] [day] [month] [year] [list]
Date: Tue, 1 Nov 2016 14:15:33 -0400
From: <cve-assign@...re.org>
To: <carnil@...ian.org>
CC: <cve-assign@...re.org>, <oss-security@...ts.openwall.com>
Subject: Re: CVE Request: OTRS: execution of JavaScript in OTRS context by opening malicious attachment

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256

> Date: 2016-11-01
> https://www.otrs.com/security-advisory-2016-02-security-update-otrs/

> An attacker could trick an authenticated agent or customer into
> opening a malicious attachment which could lead to the execution of
> JavaScript in OTRS context.

Use CVE-2016-9139.

- -- 
CVE Assignment Team
M/S M300, 202 Burlington Road, Bedford, MA 01730 USA
[ A PGP key is available for encrypted communications at
  http://cve.mitre.org/cve/request_id.html ]
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1

iQIcBAEBCAAGBQJYGNtQAAoJEHb/MwWLVhi2/HkP/2RHPdRmkxzC5t2KT2hb9KWK
Jglp7NldyOvcz8Y2KHoXO77vA6rbzShsZPVY6vOmpQPFv/YKvyzdOICWW9kLObao
5Q8O2KHBspIfky6NFlX4busIzBda6FXm1kmqyKNlt9iCMPZXyyo+qMP/rycUAso+
8TXm2+/lAhSlpKncsfekbFD0ueDtSBsxt2SIjeq6VbAxH8j7RVKktIOTatvJM7iE
ZiE+6OWmk4WcgztGZ+tSuqcsG92tmMWfMA6wjioeyFnfX2ngQ7XVZLYaV8aO/+lS
aACNhQjPcs1bc0PKJ80p5O9QKmul8dmKZuygZ4GWz/+S5jvA80neNOgAfoGEg2FC
xDmqgTaUaoaf/XExrx6tILD7icc3bF6cHWiOtQiPEtoQaNMVBFjMO5n/h5OCg4kT
jOQVo+HTfalLg16BToR/I0BS9pJ/pfaUxxj6HWpxNJXjbDmnU9aptl7PWMVrwwVo
VCsmf0wwqK46vSbHBK6hYUcEAw1Cir+p3K3oiX32cHP3n2D5xA+cnOTXulEeb86N
DZUXk7BT4YznYubPuSLPWGtlPWn0hia3JgCCLVNnHyRsWmKsojk1xzxug+L6P1Lt
xw6LwORGSUJ9bFv8YjtztNx7kJsMpoLFapwhGefhxia/NwcZQxAM1tzIIczG0vKZ
ZIYWfSRilgv+4xulgEZ+
=GDId
-----END PGP SIGNATURE-----

Powered by blists - more mailing lists

Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.

Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.