Vulnerability Description
Best Practical Request Tracker (RT) before 4.4.7 and 5.x before 5.0.5 allows Information Disclosure via fake or spoofed RT email headers in an email message or a mail-gateway REST API call.
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Bestpractical | Request Tracker | < 4.4.7 |
Related Weaknesses (CWE)
References
- https://docs.bestpractical.com/release-notes/rt/4.4.7Release NotesVendor Advisory
- https://docs.bestpractical.com/release-notes/rt/5.0.5Release NotesVendor Advisory
- https://docs.bestpractical.com/release-notes/rt/index.htmlRelease NotesVendor Advisory
- https://docs.bestpractical.com/release-notes/rt/4.4.7Release NotesVendor Advisory
- https://docs.bestpractical.com/release-notes/rt/5.0.5Release NotesVendor Advisory
- https://docs.bestpractical.com/release-notes/rt/index.htmlRelease NotesVendor Advisory
- https://lists.debian.org/debian-lts-announce/2023/10/msg00046.html
FAQ
What is CVE-2023-41259?
CVE-2023-41259 is a vulnerability with a CVSS score of 7.5 (HIGH). Best Practical Request Tracker (RT) before 4.4.7 and 5.x before 5.0.5 allows Information Disclosure via fake or spoofed RT email headers in an email message or a mail-gateway REST API call.
How severe is CVE-2023-41259?
CVE-2023-41259 has been rated HIGH with a CVSS base score of 7.5/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2023-41259?
Check the references section above for vendor advisories and patch information. Affected products include: Bestpractical Request Tracker.