Page 4 of 20 results (0.005 seconds)

CVSS: 4.0EPSS: 0%CPEs: 76EXPL: 0

Scrips_Overlay.pm in Best Practical Solutions RT before 3.8.9 does not properly restrict access to a TicketObj in a Scrip after a CurrentUser change, which allows remote authenticated users to obtain sensitive information via unspecified vectors, as demonstrated by custom-field value information, related to SQL logging. Scrips_Overlay.pm en Best Practical Solutions RT anterior a v3.8.9 no restringe el acceso adecuadamente a TicketObj en un Scrip después de un cambio en CurrentUser, lo que permite a usuarios autenticados obtener información sensible a través de vectores no especificados, como se demostró por el valor de información custom-field, relacionado con el registro SQL. • http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=614576 http://lists.bestpractical.com/pipermail/rt-announce/2011-February/000186.html http://openwall.com/lists/oss-security/2011/02/22/12 http://openwall.com/lists/oss-security/2011/02/22/16 http://openwall.com/lists/oss-security/2011/02/22/6 http://openwall.com/lists/oss-security/2011/02/23/22 http://openwall.com/lists/oss-security/2011/02/24/7 http://openwall.com/lists/oss-security/2011/02/24/8 http • CWE-264: Permissions, Privileges, and Access Controls •

CVSS: 4.3EPSS: 0%CPEs: 150EXPL: 0

Best Practical Solutions RT 3.x before 3.8.9rc2 and 4.x before 4.0.0rc4 uses the MD5 algorithm for password hashes, which makes it easier for context-dependent attackers to determine cleartext passwords via a brute-force attack on the database. Best Practical Solutions RT v3.x anterior a v3.8.9rc2 y v4.x, utiliza el algoritmo MD5 para los hashes de contraseñas, lo que hace que sea más fácil para los atacantes dependientes del contexto determinar las contraseñas sin cifrar a través de un ataque de fuerza bruta sobre la base de datos. • http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=610850 http://lists.bestpractical.com/pipermail/rt-announce/2011-January/000185.html http://lists.fedoraproject.org/pipermail/package-announce/2011-March/054740.html http://osvdb.org/70661 http://secunia.com/advisories/43438 http://www.debian.org/security/2011/dsa-2150 http://www.securityfocus.com/bid/45959 http://www.vupen.com/english/advisories/2011/0190 http://www.vupen.com/english/advisories/2011/0475 http://www.vupen.com • CWE-310: Cryptographic Issues •

CVSS: 5.8EPSS: 0%CPEs: 40EXPL: 0

Session fixation vulnerability in html/Elements/SetupSessionCookie in Best Practical Solutions RT 3.0.0 through 3.6.9 and 3.8.x through 3.8.5 allows remote attackers to hijack web sessions by setting the session identifier via a manipulation that leverages "HTTP access to the RT server," a related issue to CVE-2009-3585. Vulnerabilidad de fijación de sesión en /Elements/SetupSessionCookie en Best Practical Solutions RT v3.0.0 a la v3.6.9 y v3.8.x a la v3.8.5, permite a atacantes remotos secuestrar sesiones web manipulando el identificador de sesión lo que permite "Un acceso HTTP al servidor RT". Relacionado con el CVE-2009-3585. • http://bestpractical.typepad.com/files/rt-3.0.0-session_fixation.v3.patch http://bestpractical.typepad.com/files/rt-3.0.1-3.0.6-session_fixation.v3.patch http://bestpractical.typepad.com/files/rt-3.0.7-3.6.1-session_fixation.v3.patch http://bestpractical.typepad.com/files/rt-3.6.2-3.6.3-session_fixation.v3.patch http://bestpractical.typepad.com/files/rt-3.6.4-3.6.9-session_fixation.v2.patch http://bestpractical.typepad.com/files/rt-3.8-session_fixation.patch http: • CWE-287: Improper Authentication •

CVSS: 5.8EPSS: 0%CPEs: 40EXPL: 0

Session fixation vulnerability in html/Elements/SetupSessionCookie in Best Practical Solutions RT 3.0.0 through 3.6.9 and 3.8.x through 3.8.5 allows remote attackers to hijack web sessions by setting the session identifier via a manipulation that leverages a second web server within the same domain. Vulnerabilidad de permanencia de sesión en html/Elements/SetupSessionCookie en Best Practical Solutions RT desde v3.0.0 hasta v3.6.9 y desde v3.8.x hasta v3.8.5 permite a atacantes remotos secuestrar sesiones web fijando el identificador de sesión a través de una manipulación que aprovecha un segundo servidor web dentro del mismo dominio. • http://bestpractical.typepad.com/files/rt-3.0.0-session_fixation.v3.patch http://bestpractical.typepad.com/files/rt-3.0.1-3.0.6-session_fixation.v3.patch http://bestpractical.typepad.com/files/rt-3.0.7-3.6.1-session_fixation.v3.patch http://bestpractical.typepad.com/files/rt-3.6.2-3.6.3-session_fixation.v3.patch http://bestpractical.typepad.com/files/rt-3.6.4-3.6.9-session_fixation.v2.patch http://bestpractical.typepad.com/files/rt-3.8-session_fixation.patch http: • CWE-287: Improper Authentication •

CVSS: 4.3EPSS: 0%CPEs: 15EXPL: 0

Cross-site scripting (XSS) vulnerability in Best Practical Solutions RT 3.6.x before 3.6.9, 3.8.x before 3.8.5, and other 3.4.6 through 3.8.4 versions allows remote attackers to inject arbitrary web script or HTML via certain Custom Fields. Vulnerabilidad de ejecución de secuencias de comandos en sitios cruzados (XSS) en Best Practical Solutions RT v3.6.x anteriores a v3.6.9, v3.8.x anteriores a v3.8.5, y otros desde v3.4.6 hasta v3.8.4 permite a atacantes remotos inyectar secuencias de comandos web o HTML arbitrarios a través de ciertos campos personalizados. • http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=546778 http://lists.bestpractical.com/pipermail/rt-announce/2009-September/000172.html http://lists.bestpractical.com/pipermail/rt-announce/2009-September/000173.html http://www.openwall.com/lists/oss-security/2009/11/15/1 http://www.openwall.com/lists/oss-security/2009/11/16/4 • CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') •