Request Tracker 3.x < 3.8.9 Security Bypass and Information Disclosure
Medium Nessus Plugin ID 52455
SynopsisThe remote web server is running a Perl application that is affected by security bypass and information disclosure vulnerabilities.
DescriptionAccording to its self-reported version number, the Best Practical Solutions Request Tracker (RT) running on the remote web server is a version prior to 3.8.9. It is, therefore, potentially affected by the following vulnerabilities :
- If an individual with a valid account logs out of Request Tracker but does not close the browser, an attacker with access to that browser can use the 'back' button to access the previous user's account page.
- An information disclosure vulnerability affects the application when handling the logging of SQL queries during user transition. (CVE-2011-1008)
Note that Nessus has not tested for these issues but has instead relied only on the application's self-reported version number.
SolutionUpgrade to Request Tracker 3.8.9 or later.