First published: Thu Jul 14 2022(Updated: )
Best Practical RT for Incident Response (RTIR) before 4.0.3 and 5.x before 5.0.3 allows SSRF via the whois lookup tool.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Bestpractical Request Tracker For Incident Response | <4.0.3 | |
Bestpractical Request Tracker For Incident Response | >=5.0.0<5.0.3 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2022-25800 is a vulnerability in Best Practical RT for Incident Response (RTIR) before 4.0.3 and 5.x before 5.0.3 that allows SSRF via the whois lookup tool.
CVE-2022-25800 has a severity rating of 9.1, which is considered critical.
CVE-2022-25800 affects Best Practical RT for Incident Response (RTIR) versions before 4.0.3 and 5.x before 5.0.3.
To fix CVE-2022-25800, you should update Best Practical RT for Incident Response (RTIR) to version 4.0.3 or later for versions before 5.x, and to version 5.0.3 or later for version 5.x.
You can find more information about CVE-2022-25800 in the following references: [1](https://docs.bestpractical.com/release-notes/rtir/4.0.3), [2](https://docs.bestpractical.com/release-notes/rtir/5.0.3), [3](https://docs.bestpractical.com/release-notes/rtir/index.html).