CVE-2011-2082

critical

Description

The vulnerable-passwords script in Best Practical Solutions RT 3.x before 3.8.12 and 4.x before 4.0.6 does not update the password-hash algorithm for disabled user accounts, which makes it easier for context-dependent attackers to determine cleartext passwords, and possibly use these passwords after accounts are re-enabled, via a brute-force attack on the database. NOTE: this vulnerability exists because of an incomplete fix for CVE-2011-0009.

References

http://www.securityfocus.com/bid/53660

http://secunia.com/advisories/49259

http://lists.bestpractical.com/pipermail/rt-announce/2012-May/000204.html

http://lists.bestpractical.com/pipermail/rt-announce/2012-May/000203.html

http://lists.bestpractical.com/pipermail/rt-announce/2012-May/000202.html

Details

Source: Mitre, NVD

Published: 2012-06-04

Updated: 2012-09-29

Risk Information

CVSS v2

Base Score: 5

Vector: CVSS2#AV:N/AC:L/Au:N/C:P/I:N/A:N

Severity: Medium

CVSS v3

Base Score: 9.8

Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

Severity: Critical