First published: Wed Aug 15 2012(Updated: )
Multiple cross-site scripting (XSS) vulnerabilities in the topic administration page in the RTFM extension 2.0.4 through 2.4.3 for Best Practical Solutions RT allow remote attackers to inject arbitrary web script or HTML via unspecified vectors.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Request Tracker | =2.0.4 | |
Request Tracker | =2.0.5 | |
Request Tracker | =2.0.6 | |
Request Tracker | =2.0.7 | |
Request Tracker | =2.0.8 | |
Request Tracker | =2.0.9 | |
Request Tracker | =2.0.11 | |
Request Tracker | =2.0.12 | |
Request Tracker | =2.0.13 | |
Request Tracker | =2.0.14 | |
Request Tracker | =2.0.15 | |
Request Tracker | =2.4.3 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2012-2768 is considered a medium severity vulnerability due to the potential for cross-site scripting (XSS) attacks.
To fix CVE-2012-2768, upgrade the RTFM extension to version 2.4.4 or later, as it contains the necessary patches for this vulnerability.
CVE-2012-2768 affects RTFM extension versions 2.0.4 through 2.4.3 for Best Practical Solutions Request Tracker.
Yes, CVE-2012-2768 can be exploited remotely, allowing attackers to inject arbitrary web scripts or HTML.
The potential impacts of CVE-2012-2768 include unauthorized access to user sessions, data theft, or defacement of web pages.