CVE-2024-23793

6.3 MEDIUM

📋 TL;DR

This path traversal vulnerability in OTRS and ((OTRS)) Community Edition allows authenticated users (agents or customers) to upload malicious files to web-accessible directories. This could lead to remote code execution via Perl scripts. Affected versions include OTRS 7.0.X through 7.0.49, 8.0.X, 2023.X, 2024.X through 2024.3.2, and ((OTRS)) Community Edition 6.0.1 through 6.0.34.

💻 Affected Systems

Products:
  • OTRS
  • ((OTRS)) Community Edition
Versions: OTRS: 7.0.X through 7.0.49, 8.0.X, 2023.X, 2024.X through 2024.3.2; ((OTRS)) Community Edition: 6.0.1 through 6.0.34
Operating Systems: All platforms running affected OTRS versions
Default Config Vulnerable: ⚠️ Yes
Notes: Requires authenticated access (agent or customer user). File upload feature must be enabled.

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

Remote code execution leading to complete system compromise, data theft, or ransomware deployment.

🟠

Likely Case

Unauthorized file upload leading to web shell installation and limited server access.

🟢

If Mitigated

File upload blocked or contained with minimal impact if proper file validation and directory restrictions are in place.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires authenticated access but path traversal techniques are well-documented.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: OTRS: 7.0.50, 2024.3.3; ((OTRS)) Community Edition: 6.0.35

Vendor Advisory: https://otrs.com/release-notes/otrs-security-advisory-2024-05/

Restart Required: Yes

Instructions:

1. Backup your OTRS installation and database. 2. Download the patched version from the OTRS website. 3. Follow the official upgrade instructions for your version. 4. Restart the web server and OTRS daemon.

🔧 Temporary Workarounds

Disable file upload feature

all

Temporarily disable the file upload functionality in OTRS configuration

Modify OTRS configuration to set 'WebUploadCacheModule' to 'Kernel::System::Web::UploadCache::DB' and restrict file upload permissions

Implement web application firewall rules

all

Block path traversal patterns in file upload requests

Configure WAF to block requests containing '../' or similar path traversal sequences in file upload parameters

🧯 If You Can't Patch

  • Restrict file upload permissions to trusted users only
  • Implement strict file type validation and scanning for uploaded files

🔍 How to Verify

Check if Vulnerable:

Check OTRS version via admin interface or by examining the installation directory for version files

Check Version:

Check the OTRS admin interface or examine $OTRS_HOME/RELEASE file for version information

Verify Fix Applied:

Verify the installed version matches or exceeds the patched versions: OTRS 7.0.50+, 2024.3.3+ or ((OTRS)) Community Edition 6.0.35+

📡 Detection & Monitoring

Log Indicators:

  • Unusual file upload patterns
  • Requests containing path traversal sequences (../)
  • Uploads of executable files or scripts

Network Indicators:

  • HTTP POST requests to file upload endpoints with suspicious filenames

SIEM Query:

source="otrs.log" AND ("../" OR "..\" OR "%2e%2e%2f") AND ("upload" OR "attachment")

🔗 References

📤 Share & Export