First published: Mon Jun 04 2012(Updated: )
Best Practical Solutions RT 4.x before 4.0.6 does not properly implement the DisallowExecuteCode option, which allows remote authenticated users to bypass intended access restrictions and execute arbitrary code by leveraging access to a privileged account, a different vulnerability than CVE-2011-4458 and CVE-2011-5092.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Best Practical Solutions Request Tracker | =4.0.0-rc4 | |
Best Practical Solutions Request Tracker | =4.0.3 | |
Best Practical Solutions Request Tracker | =4.0.0-rc7 | |
Best Practical Solutions Request Tracker | =4.0.1 | |
Best Practical Solutions Request Tracker | =4.0.0-rc3 | |
Best Practical Solutions Request Tracker | =4.0.0-rc8 | |
Best Practical Solutions Request Tracker | =4.0.0-rc6 | |
Best Practical Solutions Request Tracker | =4.0.0-rc5 | |
Best Practical Solutions Request Tracker | =4.0.4 | |
Best Practical Solutions Request Tracker | =4.0.0-rc2 | |
Best Practical Solutions Request Tracker | =4.0.0 | |
Best Practical Solutions Request Tracker | =3.8.12 | |
Best Practical Solutions Request Tracker | =4.0.2 | |
Best Practical Solutions Request Tracker | =4.0.0-rc1 | |
Best Practical Solutions Request Tracker | =4.0.5 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2011-5093 is considered a high-severity vulnerability due to its ability to allow remote authenticated users to execute arbitrary code.
To fix CVE-2011-5093, you should upgrade to Best Practical Solutions RT version 4.0.6 or later.
CVE-2011-5093 affects Best Practical Solutions RT versions 4.0.0 through 4.0.5, including various release candidates.
No, CVE-2011-5093 requires a remote authenticated user with a privileged account to exploit the vulnerability.
CVE-2011-5093 is a code execution vulnerability that allows unauthorized code execution due to improper access restrictions.