First published: Fri Aug 23 2013(Updated: )
Request Tracker (RT) 4.x before 4.0.13 does not properly enforce the DeleteTicket and "custom lifecycle transition" permission, which allows remote authenticated users with the ModifyTicket permission to delete tickets via unspecified vectors.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Best Practical Solutions Request Tracker | =4.0.0 | |
Best Practical Solutions Request Tracker | =4.0.0-rc1 | |
Best Practical Solutions Request Tracker | =4.0.0-rc2 | |
Best Practical Solutions Request Tracker | =4.0.0-rc3 | |
Best Practical Solutions Request Tracker | =4.0.0-rc4 | |
Best Practical Solutions Request Tracker | =4.0.0-rc5 | |
Best Practical Solutions Request Tracker | =4.0.0-rc6 | |
Best Practical Solutions Request Tracker | =4.0.0-rc7 | |
Best Practical Solutions Request Tracker | =4.0.0-rc8 | |
Best Practical Solutions Request Tracker | =4.0.1 | |
Best Practical Solutions Request Tracker | =4.0.1-rc1 | |
Best Practical Solutions Request Tracker | =4.0.1-rc2 | |
Best Practical Solutions Request Tracker | =4.0.2 | |
Best Practical Solutions Request Tracker | =4.0.2-rc1 | |
Best Practical Solutions Request Tracker | =4.0.2-rc2 | |
Best Practical Solutions Request Tracker | =4.0.3 | |
Best Practical Solutions Request Tracker | =4.0.10 | |
Best Practical Solutions Request Tracker | =4.0.11 | |
Best Practical Solutions Request Tracker | =4.0.12 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2012-4733 is considered a moderate severity vulnerability due to its potential impact on ticket management functionalities.
To fix CVE-2012-4733, you should upgrade Request Tracker to version 4.0.13 or later, which addresses the permission enforcement issue.
CVE-2012-4733 allows remote authenticated users with modify permissions to delete tickets they should not have access to.
CVE-2012-4733 affects Request Tracker versions 4.0.0 to 4.0.12.
Yes, CVE-2012-4733 is a remote vulnerability that can be exploited by authenticated users.