Lucene search

K
nvd[email protected]NVD:CVE-2013-3525
HistoryMay 10, 2013 - 9:55 p.m.

CVE-2013-3525

2013-05-1021:55:02
CWE-89
web.nvd.nist.gov
2

CVSS2

7.5

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:L/Au:N/C:P/I:P/A:P

AI Score

8.4

Confidence

Low

EPSS

0.217

Percentile

96.5%

SQL injection vulnerability in Approvals/ in Request Tracker (RT) 4.0.10 and earlier allows remote attackers to execute arbitrary SQL commands via the ShowPending parameter. NOTE: the vendor disputes this issue, stating “We were unable to replicate it, and the individual that reported it retracted their report,” and "we had verified that the claimed exploit did not function according to the author’s claims.

Affected configurations

Nvd
Node
bestpracticalrequest_trackerRange4.0.9
OR
bestpracticalrequest_trackerMatch3.6.8
OR
bestpracticalrequest_trackerMatch3.6.10
OR
bestpracticalrequest_trackerMatch3.6.11
OR
bestpracticalrequest_trackerMatch3.8.3
OR
bestpracticalrequest_trackerMatch3.8.4
OR
bestpracticalrequest_trackerMatch3.8.7
OR
bestpracticalrequest_trackerMatch3.8.9
OR
bestpracticalrequest_trackerMatch3.8.10
OR
bestpracticalrequest_trackerMatch3.8.11
OR
bestpracticalrequest_trackerMatch3.8.12
OR
bestpracticalrequest_trackerMatch3.8.13
OR
bestpracticalrequest_trackerMatch3.8.14
OR
bestpracticalrequest_trackerMatch3.8.15
OR
bestpracticalrequest_trackerMatch3.8.16
OR
bestpracticalrequest_trackerMatch4.0.0
OR
bestpracticalrequest_trackerMatch4.0.1
OR
bestpracticalrequest_trackerMatch4.0.2
OR
bestpracticalrequest_trackerMatch4.0.3
OR
bestpracticalrequest_trackerMatch4.0.4
OR
bestpracticalrequest_trackerMatch4.0.5
OR
bestpracticalrequest_trackerMatch4.0.6
OR
bestpracticalrequest_trackerMatch4.0.7
OR
bestpracticalrequest_trackerMatch4.0.8
VendorProductVersionCPE
bestpracticalrequest_tracker*cpe:2.3:a:bestpractical:request_tracker:*:*:*:*:*:*:*:*
bestpracticalrequest_tracker3.6.8cpe:2.3:a:bestpractical:request_tracker:3.6.8:*:*:*:*:*:*:*
bestpracticalrequest_tracker3.6.10cpe:2.3:a:bestpractical:request_tracker:3.6.10:*:*:*:*:*:*:*
bestpracticalrequest_tracker3.6.11cpe:2.3:a:bestpractical:request_tracker:3.6.11:*:*:*:*:*:*:*
bestpracticalrequest_tracker3.8.3cpe:2.3:a:bestpractical:request_tracker:3.8.3:*:*:*:*:*:*:*
bestpracticalrequest_tracker3.8.4cpe:2.3:a:bestpractical:request_tracker:3.8.4:*:*:*:*:*:*:*
bestpracticalrequest_tracker3.8.7cpe:2.3:a:bestpractical:request_tracker:3.8.7:*:*:*:*:*:*:*
bestpracticalrequest_tracker3.8.9cpe:2.3:a:bestpractical:request_tracker:3.8.9:*:*:*:*:*:*:*
bestpracticalrequest_tracker3.8.10cpe:2.3:a:bestpractical:request_tracker:3.8.10:*:*:*:*:*:*:*
bestpracticalrequest_tracker3.8.11cpe:2.3:a:bestpractical:request_tracker:3.8.11:*:*:*:*:*:*:*
Rows per page:
1-10 of 241

CVSS2

7.5

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:L/Au:N/C:P/I:P/A:P

AI Score

8.4

Confidence

Low

EPSS

0.217

Percentile

96.5%

Related for NVD:CVE-2013-3525