Vulnerability Description
Unspecified vulnerability in Request Tracker (RT) 3.8.x before 3.8.17 and 4.0.x before 4.0.13, when using the Apache::Session::File session store, allows remote attackers to obtain sensitive information (user preferences and caches) via unknown vectors, related to a "limited session re-use."
CVSS Score
MEDIUM
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Bestpractical | Rt | 4.0.0 |
References
- http://lists.bestpractical.com/pipermail/rt-announce/2013-May/000226.htmlPatch
- http://lists.bestpractical.com/pipermail/rt-announce/2013-May/000227.htmlPatch
- http://lists.bestpractical.com/pipermail/rt-announce/2013-May/000228.html
- http://secunia.com/advisories/53505Vendor Advisory
- http://secunia.com/advisories/53522Vendor Advisory
- http://www.debian.org/security/2012/dsa-2670
- http://www.osvdb.org/93605
- http://lists.bestpractical.com/pipermail/rt-announce/2013-May/000226.htmlPatch
- http://lists.bestpractical.com/pipermail/rt-announce/2013-May/000227.htmlPatch
- http://lists.bestpractical.com/pipermail/rt-announce/2013-May/000228.html
- http://secunia.com/advisories/53505Vendor Advisory
- http://secunia.com/advisories/53522Vendor Advisory
- http://www.debian.org/security/2012/dsa-2670
- http://www.osvdb.org/93605
FAQ
What is CVE-2013-3374?
CVE-2013-3374 is a vulnerability with a CVSS score of 4.3 (MEDIUM). Unspecified vulnerability in Request Tracker (RT) 3.8.x before 3.8.17 and 4.0.x before 4.0.13, when using the Apache::Session::File session store, allows remote attackers to obtain sensitive informati...
How severe is CVE-2013-3374?
CVE-2013-3374 has been rated MEDIUM with a CVSS base score of 4.3/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2013-3374?
Check the references section above for vendor advisories and patch information. Affected products include: Bestpractical Rt.