{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-04-28T17:08:00.820","vulnerabilities":[{"cve":{"id":"CVE-2020-1776","sourceIdentifier":"security@otrs.com","published":"2020-07-20T21:15:12.577","lastModified":"2024-11-21T05:11:22.057","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"When an agent user is renamed or set to invalid the session belonging to the user is keept active. The session can not be used to access ticket data in the case the agent is invalid. This issue affects ((OTRS)) Community Edition: 6.0.28 and prior versions. OTRS: 7.0.18 and prior versions, 8.0.4. and prior versions."},{"lang":"es","value":"Cuando un usuario de agente es renombrado o se establece como no válido, la sesión que pertenece al usuario se mantiene activa. La sesión no puede ser usada para acceder a los datos del ticket en caso de que el agente no sea válido. Este problema afecta a ((OTRS)) Community Edition: versiones 6.0.28 y anteriores. OTRS: versiones 7.0.18 y anteriores, versiones 8.0.4. y anteriores"}],"metrics":{"cvssMetricV31":[{"source":"security@otrs.com","type":"Secondary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:L/I:N/A:N","baseScore":3.5,"baseSeverity":"LOW","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"LOW","userInteraction":"REQUIRED","scope":"UNCHANGED","confidentialityImpact":"LOW","integrityImpact":"NONE","availabilityImpact":"NONE"},"exploitabilityScore":2.1,"impactScore":1.4},{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N","baseScore":4.3,"baseSeverity":"MEDIUM","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"LOW","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"LOW","integrityImpact":"NONE","availabilityImpact":"NONE"},"exploitabilityScore":2.8,"impactScore":1.4}],"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:L/Au:S/C:P/I:N/A:N","baseScore":4.0,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"SINGLE","confidentialityImpact":"PARTIAL","integrityImpact":"NONE","availabilityImpact":"NONE"},"baseSeverity":"MEDIUM","exploitabilityScore":8.0,"impactScore":2.9,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"security@otrs.com","type":"Secondary","description":[{"lang":"en","value":"CWE-613"}]},{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"CWE-613"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:otrs:otrs:*:*:*:*:community:*:*:*","versionEndExcluding":"6.0.29","matchCriteriaId":"3AE566F3-4B9B-41EB-BC44-344A6DDDC96E"},{"vulnerable":true,"criteria":"cpe:2.3:a:otrs:otrs:*:*:*:*:*:*:*:*","versionStartIncluding":"7.0.0","versionEndExcluding":"7.0.19","matchCriteriaId":"509BA09E-2D3D-44D1-86A2-836CEEBFDA8C"},{"vulnerable":true,"criteria":"cpe:2.3:a:otrs:otrs:*:*:*:*:*:*:*:*","versionStartIncluding":"8.0.1","versionEndExcluding":"8.0.5","matchCriteriaId":"829A5F02-F738-4B71-BF9A-1511694E395E"}]}]}],"references":[{"url":"https://lists.debian.org/debian-lts-announce/2023/08/msg00040.html","source":"security@otrs.com"},{"url":"https://otrs.com/release-notes/otrs-security-advisory-2020-13/","source":"security@otrs.com","tags":["Patch","Vendor Advisory"]},{"url":"https://lists.debian.org/debian-lts-announce/2023/08/msg00040.html","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"https://otrs.com/release-notes/otrs-security-advisory-2020-13/","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Patch","Vendor Advisory"]}]}}]}