Package: otrs2 / 5.0.16-1+deb9u6

20-OSA-2017-10.diff Patch series | download
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
# This patch fixes OSA-2017-10: An attacker can send a specially prepared email
# to an OTRS system. If this system has cookie support disabled, and a logged
# in agent clicks a link in this email, the session information could be leaked
# to external systems, allowing the attacker to take over the agent’s session.
# URL: https://www.otrs.com/security-advisory-2017-10-security-update-otrs-framework/

diff --git a/Kernel/Output/HTML/Layout/Template.pm b/Kernel/Output/HTML/Layout/Template.pm
index 023b41d636..20742d7b76 100644
--- a/Kernel/Output/HTML/Layout/Template.pm
+++ b/Kernel/Output/HTML/Layout/Template.pm
@@ -214,7 +214,7 @@ sub Output {
             my $Target  = $2;
             my $End     = $3;
             my $RealEnd = $4;
-            if ( lc $Target =~ /^(http:|https:|#|ftp:)/ ||
+            if ( lc($Target) =~ /^(http:|https:|#|ftp:)/ ||
                 $Target !~ /\.(pl|php|cgi|fcg|fcgi|fpl)(\?|$)/ ||
                 $Target =~ /(\?|&|;)\Q$Self->{SessionName}\E=/) {
                 $AHref.$Target.$End.$RealEnd;
@@ -232,7 +232,7 @@ sub Output {
             my $AHref = $1;
             my $Target = $2;
             my $End = $3;
-            if (lc $Target =~ m{^http s? :}smx || !$Self->{SessionID} ||
+            if (lc($Target) =~ m{^http s? :}smx || !$Self->{SessionID} ||
                 $Target !~ /\.(pl|php|cgi|fcg|fcgi|fpl)(\?|$)/ ||
                 $Target =~ /\Q$Self->{SessionName}\E=/) {
                 $AHref.$Target.$End;