Attacker is able to determine if the provided username exists (and it's valid) using Request New Password feature, based on the response time.
{ "binaries": [ { "binary_name": "otrs", "binary_version": "5.0.7-1" }, { "binary_name": "otrs2", "binary_version": "5.0.7-1" } ] }
{ "binaries": [ { "binary_name": "otrs", "binary_version": "6.0.5-1" }, { "binary_name": "otrs2", "binary_version": "6.0.5-1" } ] }
{ "binaries": [ { "binary_name": "otrs", "binary_version": "6.0.26-1" }, { "binary_name": "otrs2", "binary_version": "6.0.26-1" } ] }
{ "binaries": [ { "binary_name": "otrs2", "binary_version": "6.2.2-2" } ] }