An attacker with the ability to generate session IDs or password reset tokens, either by being able to authenticate or by exploiting OSA-2020-09, may be able to predict other users session IDs, password reset tokens and automatically generated passwords. This issue affects ((OTRS)) Community Edition: 5.0.41 and prior versions, 6.0.26 and prior versions. OTRS; 7.0.15 and prior versions.
The product uses an algorithm or scheme that produces insufficient entropy, leaving patterns or clusters of values that are more likely to occur than others.
Name | Vendor | Start Version | End Version |
---|---|---|---|
Otrs | Otrs | 5.0.0 (including) | 5.0.41 (including) |
Otrs | Otrs | 6.0.0 (including) | 6.0.26 (including) |
Otrs | Otrs | 7.0.0 (including) | 7.0.15 (including) |
Otrs2 | Ubuntu | bionic | * |
Otrs2 | Ubuntu | eoan | * |
Otrs2 | Ubuntu | trusty | * |
Otrs2 | Ubuntu | xenial | * |