An issue was discovered in Znuny LTS 6.5.1 through 6.5.7 and Znuny 7.0.1 through 7.0.16 where a logged-in agent is able to inject SQL in the draft form ID parameter of an AJAX request.
{ "availability": "No subscription required", "ubuntu_priority": "medium", "binaries": [ { "binary_version": "6.5.8-1", "binary_name": "otrs2" }, { "binary_version": "6.5.8-1", "binary_name": "znuny" } ] }
{ "ubuntu_priority": "medium" }