summaryrefslogtreecommitdiff
diff options
context:
space:
mode:
-rw-r--r--security/vuxml/vuln.xml82
1 files changed, 82 insertions, 0 deletions
diff --git a/security/vuxml/vuln.xml b/security/vuxml/vuln.xml
index 57e989e0c8de..e1599c148b8f 100644
--- a/security/vuxml/vuln.xml
+++ b/security/vuxml/vuln.xml
@@ -52,6 +52,88 @@ Note: Please add new entries to the beginning of this file.
-->
<vuxml xmlns="http://www.vuxml.org/apps/vuxml-1">
+ <vuln vid="e0a969e4-a512-11e1-90b4-e0cb4e266481">
+ <topic>RT -- Multiple Vulnerabilities</topic>
+ <affects>
+ <package>
+ <name>rt40</name>
+ <range><ge>4.0</ge><lt>4.0.6</lt></range>
+ </package>
+ <package>
+ <name>rt38</name>
+ <range><lt>3.8.12</lt></range>
+ </package>
+ </affects>
+ <description>
+ <body xmlns="http://www.w3.org/1999/xhtml">
+ <p>BestPractical report:</p>
+ <blockquote cite="http://blog.bestpractical.com/2012/05/security-vulnerabilities-in-rt.html">
+ <p>Internal audits of the RT codebase have uncovered a
+ number of security vulnerabilities in RT. We are releasing
+ versions 3.8.12 and 4.0.6 to resolve these vulnerabilities,
+ as well as patches which apply atop all released versions of
+ 3.8 and 4.0.</p>
+ <p>The vulnerabilities addressed by 3.8.12, 4.0.6, and the
+ below patches include the following:</p>
+ <p>The previously released tool to upgrade weak password
+ hashes as part of CVE-2011-0009 was an incomplete fix and
+ failed to upgrade passwords of disabled users.</p>
+ <p>RT versions 3.0 and above contain a number of cross-site
+ scripting (XSS) vulnerabilities which allow an attacker to
+ run JavaScript with the user's credentials. CVE-2011-2083 is
+ assigned to this vulnerability.</p>
+ <p>RT versions 3.0 and above are vulnerable to multiple
+ information disclosure vulnerabilities. This includes the
+ ability for privileged users to expose users' previous
+ password hashes -- this vulnerability is particularly
+ dangerous given RT's weak hashing previous to the fix in
+ CVE-2011-0009. A separate vulnerability allows privileged
+ users to obtain correspondence history for any ticket in
+ RT. CVE-2011-2084 is assigned to this vulnerability.</p>
+ <p>All publicly released versions of RT are vulnerable to
+ cross-site request forgery (CSRF). CVE-2011-2085 is assigned
+ to this vulnerability.</p>
+ <p>We have also added a separate configuration option
+ ($RestrictLoginReferrer) to prevent login CSRF, a different
+ class of CSRF attack.</p>
+ <p>RT versions 3.6.1 and above are vulnerable to a remote
+ execution of code vulnerability if the optional VERP
+ configuration options ($VERPPrefix and $VERPDomain) are
+ enabled. RT 3.8.0 and higher are vulnerable to a limited
+ remote execution of code which can be leveraged for
+ privilege escalation. RT 4.0.0 and above contain a
+ vulnerability in the global $DisallowExecuteCode option,
+ allowing sufficiently privileged users to still execute code
+ even if RT was configured to not allow it. CVE-2011-4458 is
+ assigned to this set of vulnerabilities.</p>
+ <p>RT versions 3.0 and above may, under some circumstances,
+ still respect rights that a user only has by way of a
+ currently-disabled group. CVE-2011-4459 is assigned to this
+ vulnerability.</p>
+ <p>RT versions 2.0 and above are vulnerable to a SQL
+ injection attack, which allow privileged users to obtain
+ arbitrary information from the database. CVE-2011-4460 is
+ assigned to this vulnerability.</p>
+ </blockquote>
+ </body>
+ </description>
+ <references>
+ <cvename>CVE-2011-0009</cvename>
+ <cvename>CVE-2011-2082</cvename>
+ <cvename>CVE-2011-2083</cvename>
+ <cvename>CVE-2011-2084</cvename>
+ <cvename>CVE-2011-2085</cvename>
+ <cvename>CVE-2011-4458</cvename>
+ <cvename>CVE-2011-4459</cvename>
+ <cvename>CVE-2011-4460</cvename>
+ <url>http://blog.bestpractical.com/2012/05/security-vulnerabilities-in-rt.html</url>
+ </references>
+ <dates>
+ <discovery>2012-05-22</discovery>
+ <entry>2012-05-23</entry>
+ </dates>
+ </vuln>
+
<vuln vid="78c39232-a345-11e1-9d81-d0df9acfd7e5">
<topic>sympa -- Multiple Security Bypass Vulnerabilities</topic>
<affects>