First published: Sun Nov 11 2012(Updated: )
Cross-site request forgery (CSRF) vulnerability in Request Tracker (RT) 3.8.12 and other versions before 3.8.15, and 4.0.6 and other versions before 4.0.8, allows remote attackers to hijack the authentication of users for requests that toggle ticket bookmarks.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Best Practical Solutions Request Tracker | =3.8.12 | |
Best Practical Solutions Request Tracker | =3.8.13 | |
Best Practical Solutions Request Tracker | =3.8.13-rc1 | |
Best Practical Solutions Request Tracker | =3.8.13-rc2 | |
Best Practical Solutions Request Tracker | =3.8.14 | |
Best Practical Solutions Request Tracker | =3.8.14-rc1 | |
Best Practical Solutions Request Tracker | =4.0.6 | |
Best Practical Solutions Request Tracker | =4.0.7-rc1 | |
Best Practical Solutions Request Tracker | =4.0.8-rc1 | |
Best Practical Solutions Request Tracker | =4.0.8-rc2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2012-4732 has a medium severity level as it allows unauthorized actions through cross-site request forgery.
To fix CVE-2012-4732, upgrade your Request Tracker installation to version 3.8.15 or later, or 4.0.8 or later.
CVE-2012-4732 affects Request Tracker versions 3.8.12 through 3.8.14 and 4.0.6 through 4.0.7.
CVE-2012-4732 is a cross-site request forgery (CSRF) vulnerability.
The impact of CVE-2012-4732 is that attackers can hijack user authentication to manipulate ticket bookmarks.