Security Advisory 2015-02: Scheduler Process ID File Access

 

September 29, 2015 — Please read carefully and check if the version of your OTRS system is affected by this vulnerability.

Please send information regarding vulnerabilities in OTRS to: security@otrs.org

 

PGP Key

  • pub 2048R/9C227C6B 2011-03-21 [expires at: 2016-03-02]
  • uid OTRS Security Team <security@otrs.org>
  • GPG Fingerprint E330 4608 DA6E 34B7 1551 C244 7F9E 44E9 9C22 7C6B

 

Security Advisory Details

  • IID: OSA-2015-02
  • Date: 2015-09-17
  • Title: Scheduler Process ID File Access
  • Severity: 1.2
  • Product: OTRS 3.2.x, 3.3.x, 4.0.x
  • Fixed in: OTRS 3.2.18, 3.3.15, 4.0.13
  • FULL CVSS v2 VECTOR: (AV:L/AC:M/AU:S/C:N/I:P/A:N/E:U/RL:OF/RC:C/CDP:ND/TD:ND/CR:ND/IR:ND/AR:ND)
  • References: CVE-2015-6842, CVE-2013-7135

Vulnerability Description

This advisory covers vulnerabilities discovered in the OTRS core system.

Scheduler Process ID File Access

  • An attacker with valid LOCAL credentials could access and manipulate the process ID file for bin/otrs.schduler.pl from the CLI.
  • The Proc::Daemon module 0.14 for Perl uses world-writable permissions for a file that stores a process ID, which allows local users to have an unspecified impact by modifying this file.

Affected by this vulnerability are all releases of 3.2.x up to and including 3.2.17, 3.3.x up to and including 3.3.14 and 4.0.x up to and including 4.0.12.

 

Recommended Resolution

This vulnerability is fixed in the latest versions of OTRS and the affected packages, and it is recommended to upgrade to one of these.

Fixed releases can be found at:

Here are detailed informations about the required changes:

OTRS

However, to avoid unwanted side effects, we recommend a complete update.

Thanks to Thorsten Eckel (znuny) for discovering and reporting this issue.