3.5
CVSSv2

CVE-2012-4730

Published: 11/11/2012 Updated: 12/11/2012
CVSS v2 Base Score: 3.5 | Impact Score: 2.9 | Exploitability Score: 6.8
VMScore: 312
Vector: AV:N/AC:M/Au:S/C:P/I:N/A:N

Vulnerability Summary

Request Tracker (RT) 3.8.x prior to 3.8.15 and 4.0.x prior to 4.0.8 allows remote authenticated users with ModifySelf or AdminUser privileges to inject arbitrary email headers and conduct phishing attacks or obtain sensitive information via unknown vectors.

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

bestpractical rt 3.8.5

bestpractical rt 3.8.1

bestpractical rt 3.8.12

bestpractical rt 3.8.10

bestpractical rt 3.8.7

bestpractical rt 3.8.8

bestpractical rt 3.8.0

bestpractical rt 3.8.11

bestpractical rt 3.8.6

bestpractical rt 4.0.8

bestpractical rt 4.0.0

bestpractical rt 4.0.7

bestpractical rt 4.0.3

bestpractical rt 3.8.3

bestpractical rt 3.8.4

bestpractical rt 3.8.13

bestpractical rt 3.8.2

bestpractical rt 3.8.9

bestpractical rt 4.0.4

bestpractical rt 4.0.5

bestpractical rt 4.0.1

bestpractical rt 4.0.2

bestpractical rt 3.8.14

bestpractical rt 4.0.6

Vendor Advisories

Several vulnerabilities were discovered in Request Tracker (RT), an issue tracking system CVE-2012-4730 Authenticated users can add arbitrary headers or content to mail generated by RT CVE-2012-4732 A CSRF vulnerability may allow attackers to toggle ticket bookmarks CVE-2012-4734 If users follow a crafted URI and log in to RT, they may t ...