4.3
CVSSv2

CVE-2012-6578

Published: 24/07/2013 Updated: 24/07/2013
CVSS v2 Base Score: 4.3 | Impact Score: 2.9 | Exploitability Score: 8.6
VMScore: 383
Vector: AV:N/AC:M/Au:N/C:N/I:P/A:N

Vulnerability Summary

Best Practical Solutions RT 3.8.x prior to 3.8.15 and 4.0.x prior to 4.0.8, when GnuPG is enabled with a "Sign by default" queue configuration, uses a queue's key for signing, which might allow remote malicious users to spoof messages by leveraging the lack of authentication semantics.

Vulnerable Product Search on Vulmon Subscribe to Product

bestpractical request tracker 3.8.7

bestpractical request tracker 3.8.9

bestpractical request tracker 3.8.10

bestpractical request tracker 3.8.11

bestpractical request tracker 3.8.4

bestpractical request tracker 3.8.12

bestpractical request tracker 3.8.14

bestpractical request tracker 3.8.3

bestpractical request tracker 3.8.13

bestpractical request tracker 4.0.4

bestpractical request tracker 4.0.6

bestpractical request tracker 4.0.1

bestpractical request tracker 4.0.0

bestpractical request tracker 4.0.3

bestpractical request tracker 4.0.2

bestpractical request tracker 4.0.5

bestpractical request tracker 4.0.7

Vendor Advisories

Several vulnerabilities were discovered in Request Tracker (RT), an issue tracking system CVE-2012-4730 Authenticated users can add arbitrary headers or content to mail generated by RT CVE-2012-4732 A CSRF vulnerability may allow attackers to toggle ticket bookmarks CVE-2012-4734 If users follow a crafted URI and log in to RT, they may t ...