<?xml version="1.0" encoding="UTF-8"?>
<cvrfdoc xmlns="http://www.icasi.org/CVRF/schema/cvrf/1.1" xmlns:cvrf="http://www.icasi.org/CVRF/schema/cvrf/1.1">
  <DocumentTitle xml:lang="en">Security update for otrs</DocumentTitle>
  <DocumentType>SUSE Patch</DocumentType>
  <DocumentPublisher Type="Vendor">
    <ContactDetails>security@suse.de</ContactDetails>
    <IssuingAuthority>SUSE Security Team</IssuingAuthority>
  </DocumentPublisher>
  <DocumentTracking>
    <Identification>
      <ID>openSUSE-SU-2018:3005-1</ID>
    </Identification>
    <Status>Final</Status>
    <Version>1</Version>
    <RevisionHistory>
      <Revision>
        <Number>1</Number>
        <Date>2018-10-04T12:16:14Z</Date>
        <Description>current</Description>
      </Revision>
    </RevisionHistory>
    <InitialReleaseDate>2018-10-04T12:16:14Z</InitialReleaseDate>
    <CurrentReleaseDate>2018-10-04T12:16:14Z</CurrentReleaseDate>
    <Generator>
      <Engine>cve-database/bin/generate-cvrf.pl</Engine>
      <Date>2017-02-24T01:00:00Z</Date>
    </Generator>
  </DocumentTracking>
  <DocumentNotes>
    <Note Title="Topic" Type="Summary" Ordinal="1" xml:lang="en">Security update for otrs</Note>
    <Note Title="Details" Type="General" Ordinal="2" xml:lang="en">This update for otrs to version 4.0.32 fixes the following issues:

These security issues were fixed:

- CVE-2018-16586: An attacker could have sent a malicious email to an OTRS
  system. If a logged in user opens it, the email could have caused the browser
  to load external image or CSS resources (bsc#1109822).
- CVE-2018-16587: An attacker could have sent a malicious email to an OTRS
  system. If a user with admin permissions opens it, it caused deletions of
  arbitrary files that the OTRS web server user has write access to
  (bsc#1109823).
- CVE-2018-14593: An attacker who is logged into OTRS as an agent may have
  escalated their privileges by accessing a specially crafted URL (bsc#1103800).

These non-security issues were fixed:

- fixed permissions file @OTRS_ROOT@/var/tmp -&amp;gt; @OTRS_ROOT@/var/tmp/
- ACL for Action AgentTicketBulk were inconsistent.
</Note>
    <Note Title="Terms of Use" Type="Legal Disclaimer" Ordinal="3" xml:lang="en">The CVRF data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).</Note>
  </DocumentNotes>
  <DocumentDistribution xml:lang="en">Copyright SUSE LLC under the Creative Commons License 4.0 with Attribution (CC-BY-4.0)</DocumentDistribution>
  <DocumentReferences>
    <Reference Type="Self">
      <URL>http://lists.opensuse.org/opensuse-security-announce/2018-10/msg00005.html</URL>
      <Description>E-Mail link for openSUSE-SU-2018:3005-1</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/support/security/rating/</URL>
      <Description>SUSE Security Ratings</Description>
    </Reference>
  </DocumentReferences>
  <ProductTree xmlns="http://www.icasi.org/CVRF/schema/prod/1.1">
    <Branch Type="Product Family" Name="SUSE Package Hub for SUSE Linux Enterprise 15">
      <Branch Type="Product Name" Name="SUSE Package Hub for SUSE Linux Enterprise 15">
        <FullProductName ProductID="SUSE Package Hub for SUSE Linux Enterprise 15">SUSE Package Hub for SUSE Linux Enterprise 15</FullProductName>
      </Branch>
    </Branch>
    <Branch Type="Product Version" Name="otrs-4.0.32-bp150.3.3.1">
      <FullProductName ProductID="otrs-4.0.32-bp150.3.3.1">otrs-4.0.32-bp150.3.3.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="otrs-doc-4.0.32-bp150.3.3.1">
      <FullProductName ProductID="otrs-doc-4.0.32-bp150.3.3.1">otrs-doc-4.0.32-bp150.3.3.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="otrs-itsm-4.0.32-bp150.3.3.1">
      <FullProductName ProductID="otrs-itsm-4.0.32-bp150.3.3.1">otrs-itsm-4.0.32-bp150.3.3.1</FullProductName>
    </Branch>
    <Relationship ProductReference="otrs-4.0.32-bp150.3.3.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Package Hub for SUSE Linux Enterprise 15">
      <FullProductName ProductID="SUSE Package Hub for SUSE Linux Enterprise 15:otrs-4.0.32-bp150.3.3.1">otrs-4.0.32-bp150.3.3.1 as a component of SUSE Package Hub for SUSE Linux Enterprise 15</FullProductName>
    </Relationship>
    <Relationship ProductReference="otrs-doc-4.0.32-bp150.3.3.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Package Hub for SUSE Linux Enterprise 15">
      <FullProductName ProductID="SUSE Package Hub for SUSE Linux Enterprise 15:otrs-doc-4.0.32-bp150.3.3.1">otrs-doc-4.0.32-bp150.3.3.1 as a component of SUSE Package Hub for SUSE Linux Enterprise 15</FullProductName>
    </Relationship>
    <Relationship ProductReference="otrs-itsm-4.0.32-bp150.3.3.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Package Hub for SUSE Linux Enterprise 15">
      <FullProductName ProductID="SUSE Package Hub for SUSE Linux Enterprise 15:otrs-itsm-4.0.32-bp150.3.3.1">otrs-itsm-4.0.32-bp150.3.3.1 as a component of SUSE Package Hub for SUSE Linux Enterprise 15</FullProductName>
    </Relationship>
  </ProductTree>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="1">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">An issue was discovered in Open Ticket Request System (OTRS) 6.0.x through 6.0.9, 5.0.x through 5.0.28, and 4.0.x through 4.0.30. An attacker who is logged into OTRS as an agent may escalate their privileges by accessing a specially crafted URL.</Note>
    </Notes>
    <CVE>CVE-2018-14593</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>SUSE Package Hub for SUSE Linux Enterprise 15:otrs-4.0.32-bp150.3.3.1</ProductID>
        <ProductID>SUSE Package Hub for SUSE Linux Enterprise 15:otrs-doc-4.0.32-bp150.3.3.1</ProductID>
        <ProductID>SUSE Package Hub for SUSE Linux Enterprise 15:otrs-itsm-4.0.32-bp150.3.3.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">Please Install the update.</Description>
        <URL>http://lists.opensuse.org/opensuse-security-announce/2018-10/msg00005.html</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2018-14593.html</URL>
        <Description>CVE-2018-14593</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1103800</URL>
        <Description>SUSE Bug 1103800</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="2">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In Open Ticket Request System (OTRS) 4.0.x before 4.0.32, 5.0.x before 5.0.30, and 6.0.x before 6.0.11, an attacker could send a malicious email to an OTRS system. If a logged in user opens it, the email could cause the browser to load external image or CSS resources.</Note>
    </Notes>
    <CVE>CVE-2018-16586</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>SUSE Package Hub for SUSE Linux Enterprise 15:otrs-4.0.32-bp150.3.3.1</ProductID>
        <ProductID>SUSE Package Hub for SUSE Linux Enterprise 15:otrs-doc-4.0.32-bp150.3.3.1</ProductID>
        <ProductID>SUSE Package Hub for SUSE Linux Enterprise 15:otrs-itsm-4.0.32-bp150.3.3.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">Please Install the update.</Description>
        <URL>http://lists.opensuse.org/opensuse-security-announce/2018-10/msg00005.html</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2018-16586.html</URL>
        <Description>CVE-2018-16586</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1109822</URL>
        <Description>SUSE Bug 1109822</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="3">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In Open Ticket Request System (OTRS) 4.0.x before 4.0.32, 5.0.x before 5.0.30, and 6.0.x before 6.0.11, an attacker could send a malicious email to an OTRS system. If a user with admin permissions opens it, it causes deletions of arbitrary files that the OTRS web server user has write access to.</Note>
    </Notes>
    <CVE>CVE-2018-16587</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>SUSE Package Hub for SUSE Linux Enterprise 15:otrs-4.0.32-bp150.3.3.1</ProductID>
        <ProductID>SUSE Package Hub for SUSE Linux Enterprise 15:otrs-doc-4.0.32-bp150.3.3.1</ProductID>
        <ProductID>SUSE Package Hub for SUSE Linux Enterprise 15:otrs-itsm-4.0.32-bp150.3.3.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">Please Install the update.</Description>
        <URL>http://lists.opensuse.org/opensuse-security-announce/2018-10/msg00005.html</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2018-16587.html</URL>
        <Description>CVE-2018-16587</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1109823</URL>
        <Description>SUSE Bug 1109823</Description>
      </Reference>
    </References>
  </Vulnerability>
</cvrfdoc>
