Below vulnerabilities are reported in 17.3 RU22:
1. In ticket comments, we can use the hyperlink functionality to execute JavaScript code. Example: javascript:alert('XSS')
We can use the hyperlink functionality to inject JavaScript code and then if we edit the comment the JavaScript can be triggered. All the injected JavaScript code can later be triggered directly in the Service Catalog Notes.
2. Dragging the "Mark conversation as high importance" button to the text box and later changing its HTML code in the HTTP request.
Release : 17.3
Fix included in 17.3 RU23 and 17.4 RU1.