CVE-2023-1250

7.4 HIGH

📋 TL;DR

This vulnerability allows local attackers to execute arbitrary code on OTRS systems by injecting malicious code into ACL module comments or names during creation or import. It affects OTRS AG OTRS and OTRS Community Edition installations within specified version ranges, potentially compromising the entire system if exploited.

💻 Affected Systems

Products:
  • OTRS AG OTRS
  • OTRS AG OTRS Community Edition
Versions: OTRS: from 7.0.X before 7.0.42, from 8.0.X before 8.0.31; OTRS Community Edition: from 6.0.1 through 6.0.34
Operating Systems: All supported OS for OTRS
Default Config Vulnerable: ⚠️ Yes
Notes: Vulnerability is present in default ACL module configurations; exploitation requires permissions to create or import ACLs.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Full system compromise leading to data theft, service disruption, or lateral movement within the network.

🟠

Likely Case

Unauthorized code execution allowing privilege escalation or data manipulation within the OTRS application.

🟢

If Mitigated

Limited impact if input validation is enforced or access controls restrict ACL modifications to trusted users.

🌐 Internet-Facing: MEDIUM, as exploitation requires local access or authenticated user privileges, but internet-facing instances could be targeted via compromised accounts.
🏢 Internal Only: HIGH, as internal users with ACL management permissions could exploit this to gain elevated privileges or disrupt operations.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires authenticated access to the OTRS interface with ACL management privileges; code injection is straightforward once access is obtained.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: OTRS 7.0.42, OTRS 8.0.31, OTRS Community Edition 6.0.35 or later

Vendor Advisory: https://otrs.com/release-notes/otrs-security-advisory-2023-02/

Restart Required: Yes

Instructions:

1. Backup the OTRS system and database. 2. Download the patched version from the official OTRS website. 3. Follow the OTRS upgrade guide to apply the update. 4. Restart the OTRS services to apply changes.

🔧 Temporary Workarounds

Restrict ACL Management Permissions

all

Limit access to ACL creation and import functions to only essential, trusted administrators to reduce attack surface.

Configure OTRS group permissions via Admin > Groups > Group Management to restrict ACL module access.

🧯 If You Can't Patch

  • Implement strict input validation filters for ACL names and comments to block code injection attempts.
  • Monitor and audit ACL modification logs for suspicious activity and restrict network access to OTRS instances.

🔍 How to Verify

Check if Vulnerable:

Check the OTRS version in the Admin > System Configuration > System Information panel; if within affected ranges, the system is vulnerable.

Check Version:

In OTRS web interface, navigate to Admin > System Configuration > System Information and look for the version number.

Verify Fix Applied:

After patching, confirm the version is 7.0.42 or higher for OTRS, 8.0.31 or higher for OTRS, or 6.0.35 or higher for Community Edition.

📡 Detection & Monitoring

Log Indicators:

  • Unusual ACL creation or import events, especially with suspicious characters or code-like strings in comments or names.

Network Indicators:

  • Unexpected outbound connections from OTRS servers post-ACL modifications.

SIEM Query:

Search for OTRS logs with event_type='ACL Modification' and (comment CONTAINS 'eval' OR name CONTAINS 'system') within a short time window.

🔗 References

📤 Share & Export