4.3
CVSSv2

CVE-2012-6580

Published: 24/07/2013 Updated: 24/07/2013
CVSS v2 Base Score: 4.3 | Impact Score: 2.9 | Exploitability Score: 8.6
VMScore: 383
Vector: AV:N/AC:M/Au:N/C:N/I:P/A:N

Vulnerability Summary

Best Practical Solutions RT 3.8.x prior to 3.8.15 and 4.0.x prior to 4.0.8, when GnuPG is enabled, does not ensure that the UI labels unencrypted messages as unencrypted, which might make it easier for remote malicious users to spoof details of a message's origin or interfere with encryption-policy auditing via an e-mail message to a queue's address.

Vulnerable Product Search on Vulmon Subscribe to Product

bestpractical request tracker 3.8.3

bestpractical request tracker 3.8.4

bestpractical request tracker 3.8.7

bestpractical request tracker 3.8.9

bestpractical request tracker 3.8.11

bestpractical request tracker 3.8.13

bestpractical request tracker 3.8.14

bestpractical request tracker 3.8.10

bestpractical request tracker 3.8.12

bestpractical request tracker 4.0.6

bestpractical request tracker 4.0.3

bestpractical request tracker 4.0.5

bestpractical request tracker 4.0.7

bestpractical request tracker 4.0.1

bestpractical request tracker 4.0.0

bestpractical request tracker 4.0.2

bestpractical request tracker 4.0.4

Vendor Advisories

Several vulnerabilities were discovered in Request Tracker (RT), an issue tracking system CVE-2012-4730 Authenticated users can add arbitrary headers or content to mail generated by RT CVE-2012-4732 A CSRF vulnerability may allow attackers to toggle ticket bookmarks CVE-2012-4734 If users follow a crafted URI and log in to RT, they may t ...