{"id":"MGASA-2013-0247","summary":"Updated otrs package fixes security vulnerability","details":"It was discovered that otrs2, the Open Ticket Request System, does not\nproperly sanitise user-supplied data that is used on SQL queries. An\nattacker with a valid agent login could exploit this issue to craft\nSQL queries by injecting arbitrary SQL code through manipulated URLs\n(CVE-2013-4717).\n","modified":"2026-02-04T03:07:50.176589Z","published":"2013-08-11T12:50:44Z","related":["CVE-2013-4717"],"references":[{"type":"ADVISORY","url":"https://advisories.mageia.org/MGASA-2013-0247.html"},{"type":"REPORT","url":"https://bugs.mageia.org/show_bug.cgi?id=10927"},{"type":"REPORT","url":"http://www.debian.org/security/2013/dsa-2733"}],"affected":[{"package":{"name":"otrs","ecosystem":"Mageia:2","purl":"pkg:rpm/mageia/otrs?arch=source&distro=mageia-2"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"3.2.9-1.mga2"}]}],"ecosystem_specific":{"section":"core"},"database_specific":{"source":"https://advisories.mageia.org/MGASA-2013-0247.json"}},{"package":{"name":"otrs","ecosystem":"Mageia:3","purl":"pkg:rpm/mageia/otrs?arch=source&distro=mageia-3"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"3.2.9-1.mga3"}]}],"ecosystem_specific":{"section":"core"},"database_specific":{"source":"https://advisories.mageia.org/MGASA-2013-0247.json"}}],"schema_version":"1.7.3","credits":[{"name":"Mageia","contact":["https://wiki.mageia.org/en/Packages_Security_Team"],"type":"COORDINATOR"}]}