First published: Fri Aug 23 2013(Updated: )
Request Tracker (RT) 3.8.x before 3.8.17 and 4.0.x before 4.0.13 allows remote authenticated users with the permissions to view the administration pages to execute arbitrary private components via unspecified vectors.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Best Practical Solutions Request Tracker | =3.8.0 | |
Best Practical Solutions Request Tracker | =3.8.0-preflight1 | |
Best Practical Solutions Request Tracker | =3.8.0-rc1 | |
Best Practical Solutions Request Tracker | =3.8.0-rc2 | |
Best Practical Solutions Request Tracker | =3.8.0-rc3 | |
Best Practical Solutions Request Tracker | =3.8.1 | |
Best Practical Solutions Request Tracker | =3.8.1-preflight0 | |
Best Practical Solutions Request Tracker | =3.8.1-rc1 | |
Best Practical Solutions Request Tracker | =3.8.1-rc2 | |
Best Practical Solutions Request Tracker | =3.8.1-rc3 | |
Best Practical Solutions Request Tracker | =3.8.1-rc4 | |
Best Practical Solutions Request Tracker | =3.8.1-rc5 | |
Best Practical Solutions Request Tracker | =3.8.2 | |
Best Practical Solutions Request Tracker | =3.8.2-rc1 | |
Best Practical Solutions Request Tracker | =3.8.2-rc2 | |
Best Practical Solutions Request Tracker | =3.8.3 | |
Best Practical Solutions Request Tracker | =3.8.3-rc1 | |
Best Practical Solutions Request Tracker | =3.8.3-rc2 | |
Best Practical Solutions Request Tracker | =3.8.4 | |
Best Practical Solutions Request Tracker | =3.8.4-rc1 | |
Best Practical Solutions Request Tracker | =3.8.5 | |
Best Practical Solutions Request Tracker | =3.8.6 | |
Best Practical Solutions Request Tracker | =3.8.6-rc1 | |
Best Practical Solutions Request Tracker | =3.8.7 | |
Best Practical Solutions Request Tracker | =3.8.7-rc1 | |
Best Practical Solutions Request Tracker | =3.8.8 | |
Best Practical Solutions Request Tracker | =3.8.8-rc2 | |
Best Practical Solutions Request Tracker | =3.8.8-rc3 | |
Best Practical Solutions Request Tracker | =3.8.8-rc4 | |
Best Practical Solutions Request Tracker | =3.8.9 | |
Best Practical Solutions Request Tracker | =3.8.9-rc1 | |
Best Practical Solutions Request Tracker | =3.8.9-rc2 | |
Best Practical Solutions Request Tracker | =3.8.9-rc3 | |
Best Practical Solutions Request Tracker | =3.8.10 | |
Best Practical Solutions Request Tracker | =3.8.10-rc1 | |
Best Practical Solutions Request Tracker | =3.8.11 | |
Best Practical Solutions Request Tracker | =3.8.11-rc1 | |
Best Practical Solutions Request Tracker | =3.8.11-rc2 | |
Best Practical Solutions Request Tracker | =3.8.12 | |
Best Practical Solutions Request Tracker | =3.8.13 | |
Best Practical Solutions Request Tracker | =3.8.13-rc1 | |
Best Practical Solutions Request Tracker | =3.8.13-rc2 | |
Best Practical Solutions Request Tracker | =3.8.14 | |
Best Practical Solutions Request Tracker | =3.8.14-rc1 | |
Best Practical Solutions Request Tracker | =3.8.15 | |
Best Practical Solutions Request Tracker | =3.8.16 | |
Best Practical Solutions Request Tracker | =4.0.0 | |
Best Practical Solutions Request Tracker | =4.0.0-rc1 | |
Best Practical Solutions Request Tracker | =4.0.0-rc2 | |
Best Practical Solutions Request Tracker | =4.0.0-rc3 | |
Best Practical Solutions Request Tracker | =4.0.0-rc4 | |
Best Practical Solutions Request Tracker | =4.0.0-rc5 | |
Best Practical Solutions Request Tracker | =4.0.0-rc6 | |
Best Practical Solutions Request Tracker | =4.0.0-rc7 | |
Best Practical Solutions Request Tracker | =4.0.0-rc8 | |
Best Practical Solutions Request Tracker | =4.0.1 | |
Best Practical Solutions Request Tracker | =4.0.1-rc1 | |
Best Practical Solutions Request Tracker | =4.0.1-rc2 | |
Best Practical Solutions Request Tracker | =4.0.2 | |
Best Practical Solutions Request Tracker | =4.0.2-rc1 | |
Best Practical Solutions Request Tracker | =4.0.2-rc2 | |
Best Practical Solutions Request Tracker | =4.0.3 | |
Best Practical Solutions Request Tracker | =4.0.3-rc1 | |
Best Practical Solutions Request Tracker | =4.0.3-rc2 | |
Best Practical Solutions Request Tracker | =4.0.4 | |
Best Practical Solutions Request Tracker | =4.0.5 | |
Best Practical Solutions Request Tracker | =4.0.5-rc1 | |
Best Practical Solutions Request Tracker | =4.0.6 | |
Best Practical Solutions Request Tracker | =4.0.7 | |
Best Practical Solutions Request Tracker | =4.0.7-rc1 | |
Best Practical Solutions Request Tracker | =4.0.8 | |
Best Practical Solutions Request Tracker | =4.0.8-rc1 | |
Best Practical Solutions Request Tracker | =4.0.8-rc2 | |
Best Practical Solutions Request Tracker | =4.0.9 | |
Best Practical Solutions Request Tracker | =4.0.10 | |
Best Practical Solutions Request Tracker | =4.0.11 | |
Best Practical Solutions Request Tracker | =4.0.12 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2013-3369 has a medium severity rating as it allows remote authenticated users to execute arbitrary components.
To mitigate CVE-2013-3369, upgrade to Request Tracker version 3.8.17 or 4.0.13 or later.
CVE-2013-3369 affects users of Request Tracker versions 3.8.x prior to 3.8.17 and 4.0.x prior to 4.0.13.
Attackers can leverage CVE-2013-3369 to execute arbitrary private components if they have access to administration pages.
Organizations can prevent exploitation of CVE-2013-3369 by restricting access to administration pages and applying the necessary software updates.