1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28
|
# This patch fixes OSA-2017-10: An attacker can send a specially prepared email
# to an OTRS system. If this system has cookie support disabled, and a logged
# in agent clicks a link in this email, the session information could be leaked
# to external systems, allowing the attacker to take over the agent’s session.
# URL: https://www.otrs.com/security-advisory-2017-10-security-update-otrs-framework/
diff --git a/Kernel/Output/HTML/Layout/Template.pm b/Kernel/Output/HTML/Layout/Template.pm
index 023b41d636..20742d7b76 100644
--- a/Kernel/Output/HTML/Layout/Template.pm
+++ b/Kernel/Output/HTML/Layout/Template.pm
@@ -214,7 +214,7 @@ sub Output {
my $Target = $2;
my $End = $3;
my $RealEnd = $4;
- if ( lc $Target =~ /^(http:|https:|#|ftp:)/ ||
+ if ( lc($Target) =~ /^(http:|https:|#|ftp:)/ ||
$Target !~ /\.(pl|php|cgi|fcg|fcgi|fpl)(\?|$)/ ||
$Target =~ /(\?|&|;)\Q$Self->{SessionName}\E=/) {
$AHref.$Target.$End.$RealEnd;
@@ -232,7 +232,7 @@ sub Output {
my $AHref = $1;
my $Target = $2;
my $End = $3;
- if (lc $Target =~ m{^http s? :}smx || !$Self->{SessionID} ||
+ if (lc($Target) =~ m{^http s? :}smx || !$Self->{SessionID} ||
$Target !~ /\.(pl|php|cgi|fcg|fcgi|fpl)(\?|$)/ ||
$Target =~ /\Q$Self->{SessionName}\E=/) {
$AHref.$Target.$End;
|