{"api_version":"1","generated_at":"2026-04-23T01:32:58+00:00","cve":"CVE-2023-2534","urls":{"html":"https://cve.report/CVE-2023-2534","api":"https://cve.report/api/cve/CVE-2023-2534.json","docs":"https://cve.report/api","cve_org":"https://www.cve.org/CVERecord?id=CVE-2023-2534","nvd":"https://nvd.nist.gov/vuln/detail/CVE-2023-2534"},"summary":{"title":"CVE-2023-2534","description":"Improper Authorization vulnerability in OTRS AG OTRS 8 (Websocket API backend) allows any as Agent authenticated attacker to track user behaviour and to gain live insight into overall system usage. User IDs can easily be correlated with real names e. g. via\nticket histories by any user. (Fuzzing for garnering other adjacent user/sensitive data). Subscribing to all possible push events could also lead to performance implications on the server side, depending on the size of the installation\nand the number of active users. (Flooding)This issue affects OTRS: from 8.0.X before 8.0.32.","state":"PUBLIC","assigner":"security@otrs.com","published_at":"2023-05-08 08:15:00","updated_at":"2023-05-16 14:13:00"},"problem_types":["CWE-863"],"metrics":[],"references":[{"url":"https://otrs.com/release-notes/otrs-security-advisory-2023-03/","name":"https://otrs.com/release-notes/otrs-security-advisory-2023-03/","refsource":"MISC","tags":[],"title":"Seite wurde nicht gefunden: | OTRS","mime":"text/html","httpstatus":"404","archivestatus":"404"},{"url":"https://www.cve.org/CVERecord?id=CVE-2023-2534","name":"CVE Program record","refsource":"CVE.ORG","tags":["canonical"]},{"url":"https://nvd.nist.gov/vuln/detail/CVE-2023-2534","name":"NVD vulnerability detail","refsource":"NVD","tags":["canonical","analysis"]}],"affected":[],"timeline":[],"solutions":[],"workarounds":[],"exploits":[],"credits":[],"nvd_cpes":[{"cve_year":"2023","cve_id":"2534","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"otrs","cpe5":"otrs","cpe6":"*","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"}],"vendor_comments":[],"enrichments":{"kev":null,"epss":null,"legacy_qids":[]},"source_records":{"cve_program":{"data_version":"4.0","data_type":"CVE","data_format":"MITRE","CVE_data_meta":{"ID":"CVE-2023-2534","ASSIGNER":"security@otrs.com","STATE":"PUBLIC"},"description":{"description_data":[{"lang":"eng","value":"Improper Authorization vulnerability in OTRS AG OTRS 8 (Websocket API backend) allows any as Agent authenticated attacker to track user behaviour and to gain live insight into overall system usage. User IDs can easily be correlated with real names e. g. via\nticket histories by any user. (Fuzzing for garnering other adjacent user/sensitive data). Subscribing to all possible push events could also lead to performance implications on the server side, depending on the size of the installation\nand the number of active users. (Flooding)This issue affects OTRS: from 8.0.X before 8.0.32.\n\n"}]},"problemtype":{"problemtype_data":[{"description":[{"lang":"eng","value":"CWE-285 Improper Authorization","cweId":"CWE-285"}]}]},"affects":{"vendor":{"vendor_data":[{"vendor_name":"OTRS AG","product":{"product_data":[{"product_name":"OTRS","version":{"version_data":[{"version_value":"not down converted","x_cve_json_5_version_data":{"versions":[{"lessThan":"8.0.32","status":"affected","version":"8.0.x","versionType":"Patch"}],"defaultStatus":"affected"}}]}}]}}]}},"references":{"reference_data":[{"url":"https://otrs.com/release-notes/otrs-security-advisory-2023-03/","refsource":"MISC","name":"https://otrs.com/release-notes/otrs-security-advisory-2023-03/"}]},"generator":{"engine":"Vulnogram 0.1.0-dev"},"source":{"advisory":"OSA-2023-03","defect":["500","2022122042001337"],"discovery":"EXTERNAL"},"solution":[{"lang":"en","supportingMedia":[{"base64":false,"type":"text/html","value":"Update to OTRS 8.0.32<br>"}],"value":"Update to OTRS 8.0.32\n"}],"credits":[{"lang":"en","value":"Special thanks to  Maximilian Gutwein for reporting these vulnerability."}],"impact":{"cvss":[{"attackComplexity":"LOW","attackVector":"NETWORK","availabilityImpact":"LOW","baseScore":7.6,"baseSeverity":"HIGH","confidentialityImpact":"LOW","integrityImpact":"HIGH","privilegesRequired":"LOW","scope":"UNCHANGED","userInteraction":"NONE","vectorString":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:H/A:L","version":"3.1"}]}},"nvd":{"publishedDate":"2023-05-08 08:15:00","lastModifiedDate":"2023-05-16 14:13:00","problem_types":["CWE-863"],"metrics":{"baseMetricV3":{"cvssV3":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"LOW","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"NONE","availabilityImpact":"HIGH","baseScore":8.1,"baseSeverity":"HIGH"},"exploitabilityScore":2.8,"impactScore":5.2}},"configurations":{"CVE_data_version":"4.0","nodes":[{"operator":"OR","children":[],"cpe_match":[{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:otrs:otrs:*:*:*:*:*:*:*:*","versionStartIncluding":"8.0.0","versionEndExcluding":"8.0.32","cpe_name":[]}]}]}},"legacy_mitre":{"record":null,"notes":[]}}}