CVE-2024-23794

5.2 MEDIUM

📋 TL;DR

An incorrect privilege assignment vulnerability in OTRS allows agents with read-only permissions to gain full access to tickets in rare configurations. This privilege escalation occurs when an admin has enabled the 'RequiredLock' setting for the 'AgentFrontend::Ticket::InlineEditing::Property###Watch' configuration. Affected versions include OTRS 8.0.X, 2023.X, and 2024.X through 2024.4.x.

💻 Affected Systems

Products:
  • OTRS
Versions: 8.0.X, 2023.X, 2024.X through 2024.4.x
Operating Systems: All platforms running OTRS
Default Config Vulnerable: ✅ No
Notes: Only vulnerable when 'RequiredLock' setting of 'AgentFrontend::Ticket::InlineEditing::Property###Watch' is enabled in system configuration, which is not the default.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Read-only agents gain full administrative control over tickets, allowing them to modify, delete, or escalate ticket data without authorization.

🟠

Likely Case

Read-only agents can edit tickets they shouldn't have access to, potentially altering sensitive information or bypassing workflow controls.

🟢

If Mitigated

With proper access controls and monitoring, impact is limited to unauthorized ticket modifications that can be detected and rolled back.

🌐 Internet-Facing: MEDIUM - While exploitation requires authenticated access, internet-facing OTRS instances are exposed to credential-based attacks that could lead to privilege escalation.
🏢 Internal Only: MEDIUM - Internal users with read-only access could exploit this to gain unauthorized ticket modification capabilities.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires authenticated read-only agent access and specific configuration settings enabled by administrators.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 2024.5.0 and later

Vendor Advisory: https://otrs.com/release-notes/otrs-security-advisory-2024-06/

Restart Required: Yes

Instructions:

1. Backup your OTRS installation and database. 2. Download and install OTRS version 2024.5.0 or later from the official vendor. 3. Apply the update following OTRS upgrade procedures. 4. Restart the OTRS service.

🔧 Temporary Workarounds

Disable Inline Editing Configuration

all

Disable the vulnerable 'RequiredLock' setting for the inline editing functionality

Navigate to OTRS Admin > System Configuration > Filter for 'AgentFrontend::Ticket::InlineEditing::Property###Watch' > Set 'RequiredLock' to disabled

🧯 If You Can't Patch

  • Review and restrict read-only agent permissions to minimize potential impact
  • Implement enhanced logging and monitoring for ticket modification activities

🔍 How to Verify

Check if Vulnerable:

Check OTRS version and verify if 'RequiredLock' setting for 'AgentFrontend::Ticket::InlineEditing::Property###Watch' is enabled in system configuration

Check Version:

Check OTRS version in Admin > System Information or via database query: SELECT * FROM package_repository WHERE name LIKE 'OTRS%'

Verify Fix Applied:

Verify OTRS version is 2024.5.0 or later and test that read-only agents cannot modify tickets

📡 Detection & Monitoring

Log Indicators:

  • Unauthorized ticket modifications by read-only agents
  • Multiple failed permission checks followed by successful ticket edits

Network Indicators:

  • Unusual ticket update patterns from read-only user accounts

SIEM Query:

source="otrs" (user_role="read-only" AND action="ticket_update")

🔗 References

📤 Share & Export