4.3
CVSSv2

CVE-2012-6581

Published: 24/07/2013 Updated: 24/07/2013
CVSS v2 Base Score: 4.3 | Impact Score: 2.9 | Exploitability Score: 8.6
VMScore: 383
Vector: AV:N/AC:M/Au:N/C:N/I:P/A:N

Vulnerability Summary

Best Practical Solutions RT 3.8.x prior to 3.8.15 and 4.0.x prior to 4.0.8, when GnuPG is enabled, allows remote malicious users to bypass intended restrictions on reading keys in the product's keyring, and trigger outbound e-mail messages signed by an arbitrary stored secret key, by leveraging a UI e-mail signing privilege.

Vulnerable Product Search on Vulmon Subscribe to Product

bestpractical request tracker 3.8.3

bestpractical request tracker 3.8.4

bestpractical request tracker 3.8.7

bestpractical request tracker 3.8.10

bestpractical request tracker 3.8.12

bestpractical request tracker 3.8.13

bestpractical request tracker 3.8.14

bestpractical request tracker 3.8.9

bestpractical request tracker 3.8.11

bestpractical request tracker 4.0.5

bestpractical request tracker 4.0.4

bestpractical request tracker 4.0.7

bestpractical request tracker 4.0.6

bestpractical request tracker 4.0.0

bestpractical request tracker 4.0.2

bestpractical request tracker 4.0.1

bestpractical request tracker 4.0.3

Vendor Advisories

Several vulnerabilities were discovered in Request Tracker (RT), an issue tracking system CVE-2012-4730 Authenticated users can add arbitrary headers or content to mail generated by RT CVE-2012-4732 A CSRF vulnerability may allow attackers to toggle ticket bookmarks CVE-2012-4734 If users follow a crafted URI and log in to RT, they may t ...