Last modified: 2014-04-10 11:25:38 UTC
http://www.otrs.com/security-advisory-2014-03-xss-issue/ "An attacker could send a specially prepared HTML email to OTRS. If he can then trick an agent into following a special link to display this email, JavaScript code would be executed."
Thanks for reporting! Jeff Green: Could you take a look at this?
I applied the patches for 3.2.x to buy us a little time to plan a a maintenance window for the upgrade.
RT #6916
Since patch-level updates can be skipped, bug 63685 should be fixed instead of this one.
closing 61912 since we patched to fix the main issue, and now have 63685 which supersedes
*** This bug has been marked as a duplicate of bug 63685 ***