RT: Request Tracker Session Fixation Vulnerability

medium Nessus Network Monitor Plugin ID 5248

Synopsis

The remote host is running a web application that is affected by a session fixation vulnerability.

Description

The remote host is running RT: Request Tracker, an enterprise-grade ticketing system. The version detected is affected by a session fixation vulnerability. An attacker, exploiting this flaw, could gain unauthorized access to the application.

Solution

Upgrade to RT 3.8.6, 3.6.10, or later.

See Also

http://www.nessus.org/u?443e08f3 (RT 3.8.6)

http://www.nessus.org/u?33d71852 (RT 3.6.10)

http://lists.bestpractical.com/pipermail/rt-announce/2009-November/000176.html

Plugin Details

Severity: Medium

ID: 5248

Family: CGI

Published: 12/1/2009

Updated: 3/6/2019

Nessus ID: 43006

Risk Information

VPR

Risk Factor: Low

Score: 3.4

CVSS v2

Risk Factor: Medium

Base Score: 6.8

Temporal Score: 5.6

Vector: CVSS2#AV:N/AC:M/Au:N/C:P/I:P/A:P

CVSS v3

Risk Factor: Medium

Base Score: 5.6

Temporal Score: 5.2

Vector: CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L

Temporal Vector: CVSS:3.0/E:F/RL:O/RC:C

Vulnerability Information

CPE: cpe:/a:bestpractical:rt

Patch Publication Date: 11/30/2009

Vulnerability Publication Date: 11/30/2009

Reference Information

CVE: CVE-2009-3585, CVE-2009-4151

BID: 37162