Vulnerability Description
RT (aka Request Tracker) before 4.0.23 and 4.2.x before 4.2.10 allows remote attackers to hijack sessions via an RSS feed URL.
CVSS Score
6.4
MEDIUM
AV:N/AC:L/Au:N/C:P/I:P/A:N
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Fedoraproject | Fedora | 21 |
| Bestpractical | Request Tracker | <= 4.0.22 |
Related Weaknesses (CWE)
References
- http://blog.bestpractical.com/2015/02/security-vulnerabilities-in-rt.htmlVendor Advisory
- http://lists.fedoraproject.org/pipermail/package-announce/2015-April/154213.html
- http://lists.fedoraproject.org/pipermail/package-announce/2015-March/154047.html
- http://www.debian.org/security/2015/dsa-3176
- http://blog.bestpractical.com/2015/02/security-vulnerabilities-in-rt.htmlVendor Advisory
- http://lists.fedoraproject.org/pipermail/package-announce/2015-April/154213.html
- http://lists.fedoraproject.org/pipermail/package-announce/2015-March/154047.html
- http://www.debian.org/security/2015/dsa-3176
FAQ
What is CVE-2015-1464?
CVE-2015-1464 is a vulnerability with a CVSS score of 6.4 (MEDIUM). RT (aka Request Tracker) before 4.0.23 and 4.2.x before 4.2.10 allows remote attackers to hijack sessions via an RSS feed URL.
How severe is CVE-2015-1464?
CVE-2015-1464 has been rated MEDIUM with a CVSS base score of 6.4/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2015-1464?
Check the references section above for vendor advisories and patch information. Affected products include: Fedoraproject Fedora, Bestpractical Request Tracker.