{"id":"CVE-2020-1773","details":"An attacker with the ability to generate session IDs or password reset tokens, either by being able to authenticate or by exploiting OSA-2020-09, may be able to predict other users session IDs, password reset tokens and automatically generated passwords. This issue affects ((OTRS)) Community Edition: 5.0.41 and prior versions, 6.0.26 and prior versions. OTRS; 7.0.15 and prior versions.","modified":"2026-03-15T22:34:33.760634Z","published":"2020-03-27T13:15:15.473Z","related":["openSUSE-SU-2020:0551-1","openSUSE-SU-2020:1475-1","openSUSE-SU-2020:1509-1"],"references":[{"type":"WEB","url":"http://lists.opensuse.org/opensuse-security-announce/2020-04/msg00038.html"},{"type":"WEB","url":"http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00066.html"},{"type":"WEB","url":"http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00077.html"},{"type":"WEB","url":"https://lists.debian.org/debian-lts-announce/2023/08/msg00040.html"},{"type":"ADVISORY","url":"https://otrs.com/release-notes/otrs-security-advisory-2020-10/"}],"affected":[{"database_specific":{"unresolved_ranges":[{"events":[{"introduced":"5.0.0"},{"last_affected":"5.0.41"}]},{"events":[{"introduced":"6.0.0"},{"last_affected":"6.0.26"}]},{"events":[{"introduced":"7.0.0"},{"last_affected":"7.0.15"}]}],"source":"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2020-1773.json"}}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N"}]}