Request Tracker 4.0.x < 4.0.23 / 4.2.x < 4.2.10 Multiple Vulnerabilities

medium Nessus Plugin ID 83140

Synopsis

The remote web server is running a Perl application that is affected by multiple vulnerabilities.

Description

According to its self-reported version number, the Best Practical Solutions Request Tracker (RT) running on the remote web server is version 4.0.x prior to 4.0.23 or version 4.2.x prior to 4.2.10. It is, therefore, potentially affected by the following vulnerabilities :

- A flaw exists in the email gateway that allows remote attackers to cause a denial of service via a specially crafted email. (CVE-2014-9472)
- A flaw exists that allows remote attackers to obtain sensitive RSS feed URLs and ticket data via unspecified vectors. (CVE-2015-1165)
- A flaw exists in how RSS feed URLs are handled that could allow a remote attacker to log in as the user who created the feed. (CVE-2015-1464)

Note that Nessus has not tested for these issues but has instead relied only on the application's self-reported version number.

Solution

Upgrade to Request Tracker 4.0.23 / 4.2.10 or later.

See Also

https://docs.bestpractical.com/release-notes/rt/4.2.10

Plugin Details

Severity: Medium

ID: 83140

File Name: rt_4_2_10.nasl

Version: 1.7

Type: remote

Family: CGI abuses

Published: 4/29/2015

Updated: 4/11/2022

Configuration: Enable paranoid mode, Enable thorough checks

Supported Sensors: Nessus

Risk Information

VPR

Risk Factor: Medium

Score: 4.2

CVSS v2

Risk Factor: Medium

Base Score: 6.4

Temporal Score: 4.7

Vector: CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:N

CVSS Score Source: CVE-2015-1464

Vulnerability Information

CPE: cpe:/a:bestpractical:rt

Required KB Items: Settings/ParanoidReport, installed_sw/RT

Excluded KB Items: Settings/disable_cgi_scanning

Exploit Ease: No exploit is required

Patch Publication Date: 2/26/2015

Vulnerability Publication Date: 2/26/2015

Reference Information

CVE: CVE-2014-9472, CVE-2015-1165, CVE-2015-1464

BID: 72832, 72833, 72837