CVE-2011-1687
https://notcve.org/view.php?id=CVE-2011-1687
Best Practical Solutions RT 3.0.0 through 3.6.10, 3.8.0 through 3.8.9, and 4.0.0rc through 4.0.0rc7 allows remote authenticated users to obtain sensitive information by using the search interface, as demonstrated by retrieving encrypted passwords. Best Practical Solutions RT v2.0.0 hasta v3.6.10, v3.8.0 hasta v3.8.9, y v4.0.0rc hasta 4.0.0rc7 permite a usuarios remotos autenticados, obtener información confidencial mediante el uso de la interfaz de búsqueda, como lo demuestra la recuperación de contraseñas codificadas. • http://blog.bestpractical.com/2011/04/security-vulnerabilities-in-rt.html http://lists.bestpractical.com/pipermail/rt-announce/2011-April/000187.html http://lists.bestpractical.com/pipermail/rt-announce/2011-April/000188.html http://lists.bestpractical.com/pipermail/rt-announce/2011-April/000189.html http://secunia.com/advisories/44189 http://www.debian.org/security/2011/dsa-2220 http://www.securityfocus.com/bid/47383 http://www.vupen.com/english/advisories/2011/1071 https://bugzilla.red • CWE-200: Exposure of Sensitive Information to an Unauthorized Actor •
CVE-2011-1008
https://notcve.org/view.php?id=CVE-2011-1008
Scrips_Overlay.pm in Best Practical Solutions RT before 3.8.9 does not properly restrict access to a TicketObj in a Scrip after a CurrentUser change, which allows remote authenticated users to obtain sensitive information via unspecified vectors, as demonstrated by custom-field value information, related to SQL logging. Scrips_Overlay.pm en Best Practical Solutions RT anterior a v3.8.9 no restringe el acceso adecuadamente a TicketObj en un Scrip después de un cambio en CurrentUser, lo que permite a usuarios autenticados obtener información sensible a través de vectores no especificados, como se demostró por el valor de información custom-field, relacionado con el registro SQL. • http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=614576 http://lists.bestpractical.com/pipermail/rt-announce/2011-February/000186.html http://openwall.com/lists/oss-security/2011/02/22/12 http://openwall.com/lists/oss-security/2011/02/22/16 http://openwall.com/lists/oss-security/2011/02/22/6 http://openwall.com/lists/oss-security/2011/02/23/22 http://openwall.com/lists/oss-security/2011/02/24/7 http://openwall.com/lists/oss-security/2011/02/24/8 http • CWE-264: Permissions, Privileges, and Access Controls •
CVE-2011-1007
https://notcve.org/view.php?id=CVE-2011-1007
Best Practical Solutions RT before 3.8.9 does not perform certain redirect actions upon a login, which allows physically proximate attackers to obtain credentials by resubmitting the login form via the back button of a web browser on an unattended workstation after an RT logout. Best Practical Solutions RT anterior a v3.8.9 no desarrolla ciertas redirecciones en el login, lo que permite a atacantes próximos físicamente obtener credenciales reenviando el formulario de registro a través del botón back en un buscador web en una máquina de trabajo no atendidad después de un cierre de sesión RT. • http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=614575 http://issues.bestpractical.com/Ticket/Display.html?id=15804 http://lists.bestpractical.com/pipermail/rt-announce/2011-February/000186.html http://openwall.com/lists/oss-security/2011/02/22/12 http://openwall.com/lists/oss-security/2011/02/22/16 http://openwall.com/lists/oss-security/2011/02/22/6 http://openwall.com/lists/oss-security/2011/02/23/22 http://openwall.com/lists/oss-security/2011/02/24/7 htt • CWE-255: Credentials Management Errors •
CVE-2011-0009
https://notcve.org/view.php?id=CVE-2011-0009
Best Practical Solutions RT 3.x before 3.8.9rc2 and 4.x before 4.0.0rc4 uses the MD5 algorithm for password hashes, which makes it easier for context-dependent attackers to determine cleartext passwords via a brute-force attack on the database. Best Practical Solutions RT v3.x anterior a v3.8.9rc2 y v4.x, utiliza el algoritmo MD5 para los hashes de contraseñas, lo que hace que sea más fácil para los atacantes dependientes del contexto determinar las contraseñas sin cifrar a través de un ataque de fuerza bruta sobre la base de datos. • http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=610850 http://lists.bestpractical.com/pipermail/rt-announce/2011-January/000185.html http://lists.fedoraproject.org/pipermail/package-announce/2011-March/054740.html http://osvdb.org/70661 http://secunia.com/advisories/43438 http://www.debian.org/security/2011/dsa-2150 http://www.securityfocus.com/bid/45959 http://www.vupen.com/english/advisories/2011/0190 http://www.vupen.com/english/advisories/2011/0475 http://www.vupen.com • CWE-310: Cryptographic Issues •
CVE-2008-3502
https://notcve.org/view.php?id=CVE-2008-3502
Unspecified vulnerability in Best Practical Solutions RT 3.0.0 through 3.6.6 allows remote authenticated users to cause a denial of service (CPU or memory consumption) via unspecified vectors related to the Devel::StackTrace module for Perl. Vulnerabilidad no especificada en Best Practical Solutions RT 3.0.0 hasta 3.6.6 permite a usuarios remotos autenticados provocar una denegación de servicio (agotamiento de CPU o memoria) a través de vectores no especificados relacionados con el módulo Devel::StackTrace de Perl. • http://lists.bestpractical.com/pipermail/rt-announce/2008-June/000158.html http://secunia.com/advisories/30830 http://www.securityfocus.com/bid/29925 https://exchange.xforce.ibmcloud.com/vulnerabilities/43337 •