Executive Summary

Informations
Name CVE-2011-1008 First vendor Publication 2011-02-28
Vendor Cve Last vendor Modification 2024-11-21

Security-Database Scoring CVSS v3

Cvss vector : N/A
Overall CVSS Score NA
Base Score NA Environmental Score NA
impact SubScore NA Temporal Score NA
Exploitabality Sub Score NA
 
Calculate full CVSS 3.0 Vectors scores

Security-Database Scoring CVSS v2

Cvss vector : (AV:N/AC:L/Au:S/C:P/I:N/A:N)
Cvss Base Score 4 Attack Range Network
Cvss Impact Score 2.9 Attack Complexity Low
Cvss Expoit Score 8 Authentication Requires single instance
Calculate full CVSS 2.0 Vectors scores

Detail

Scrips_Overlay.pm in Best Practical Solutions RT before 3.8.9 does not properly restrict access to a TicketObj in a Scrip after a CurrentUser change, which allows remote authenticated users to obtain sensitive information via unspecified vectors, as demonstrated by custom-field value information, related to SQL logging.

Original Source

Url : http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-1008

CWE : Common Weakness Enumeration

% Id Name
100 % CWE-264 Permissions, Privileges, and Access Controls

CPE : Common Platform Enumeration

TypeDescriptionCount
Application 182

OpenVAS Exploits

Date Description
2011-03-09 Name : RT (Request Tracker) Multiple Vulnerabilities
File : nvt/gb_rt_mult_vuln.nasl

Open Source Vulnerability Database (OSVDB)

Id Description
71011 RT Scrips_Overlay.pm TicketObj Access Unspecified Information Disclosure

Best Practical Solutions Request Tracker contains a flaw that may lead to an unauthorized information disclosure.  The issue is triggered when 'Scrips_Overlay.pm' fails to properly restrict access to 'TicketObj' in a 'Scrip' following a 'CurrentUser' change, which will disclose potentially sensitive information to a remote authenticated attacker.

Nessus® Vulnerability Scanner

Date Description
2011-02-25 Name : The remote web server is running a Perl application that is affected by secur...
File : rt_389.nasl - Type : ACT_GATHER_INFO

Sources (Detail)

http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=614576
http://lists.bestpractical.com/pipermail/rt-announce/2011-February/000186.html
http://openwall.com/lists/oss-security/2011/02/22/12
http://openwall.com/lists/oss-security/2011/02/22/16
http://openwall.com/lists/oss-security/2011/02/22/6
http://openwall.com/lists/oss-security/2011/02/23/22
http://openwall.com/lists/oss-security/2011/02/24/7
http://openwall.com/lists/oss-security/2011/02/24/8
http://openwall.com/lists/oss-security/2011/02/24/9
http://osvdb.org/71011
http://secunia.com/advisories/43438
http://www.vupen.com/english/advisories/2011/0475
https://exchange.xforce.ibmcloud.com/vulnerabilities/65772
https://github.com/bestpractical/rt/commit/2338cd19ed7a7f4c1e94f639ab2789d658...
https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0...
Source Url

Alert History

If you want to see full details history, please login or register.
0
1
2
3
4
5
6
7
8
9
10
11
12
13
Date Informations
2024-11-28 23:05:57
  • Multiple Updates
2024-11-28 12:25:02
  • Multiple Updates
2023-11-07 21:47:29
  • Multiple Updates
2021-05-04 12:17:29
  • Multiple Updates
2021-04-22 01:20:49
  • Multiple Updates
2021-03-26 12:07:45
  • Multiple Updates
2020-05-23 01:43:59
  • Multiple Updates
2020-05-23 00:27:55
  • Multiple Updates
2017-08-17 09:23:19
  • Multiple Updates
2016-06-29 00:18:36
  • Multiple Updates
2016-06-28 18:34:33
  • Multiple Updates
2016-04-26 20:35:51
  • Multiple Updates
2014-02-17 11:00:52
  • Multiple Updates
2013-05-10 22:55:56
  • Multiple Updates