Lucene search

K
cve[email protected]CVE-2013-3374
HistoryOct 03, 2022 - 4:14 p.m.

CVE-2013-3374

2022-10-0316:14:45
web.nvd.nist.gov
21
cve-2013-3374
request tracker
rt
apache::session::file
vulnerability
sensitive information
remote attackers

4.3 Medium

CVSS2

Attack Vector

NETWORK

Attack Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

NONE

Availability Impact

NONE

AV:N/AC:M/Au:N/C:P/I:N/A:N

8.2 High

AI Score

Confidence

High

0.003 Low

EPSS

Percentile

69.9%

Unspecified vulnerability in Request Tracker (RT) 3.8.x before 3.8.17 and 4.0.x before 4.0.13, when using the Apache::Session::File session store, allows remote attackers to obtain sensitive information (user preferences and caches) via unknown vectors, related to a “limited session re-use.”

Affected configurations

NVD
Node
bestpracticalrtMatch4.0.0
OR
bestpracticalrtMatch4.0.0rc1
OR
bestpracticalrtMatch4.0.0rc2
OR
bestpracticalrtMatch4.0.0rc3
OR
bestpracticalrtMatch4.0.0rc4
OR
bestpracticalrtMatch4.0.0rc5
OR
bestpracticalrtMatch4.0.0rc6
OR
bestpracticalrtMatch4.0.0rc7
OR
bestpracticalrtMatch4.0.0rc8
OR
bestpracticalrtMatch4.0.1
OR
bestpracticalrtMatch4.0.1rc1
OR
bestpracticalrtMatch4.0.1rc2
OR
bestpracticalrtMatch4.0.2
OR
bestpracticalrtMatch4.0.2rc1
OR
bestpracticalrtMatch4.0.2rc2
OR
bestpracticalrtMatch4.0.3
OR
bestpracticalrtMatch4.0.3rc1
OR
bestpracticalrtMatch4.0.3rc2
OR
bestpracticalrtMatch4.0.4
OR
bestpracticalrtMatch4.0.5
OR
bestpracticalrtMatch4.0.5rc1
OR
bestpracticalrtMatch4.0.6
OR
bestpracticalrtMatch4.0.7
OR
bestpracticalrtMatch4.0.7rc1
OR
bestpracticalrtMatch4.0.8
OR
bestpracticalrtMatch4.0.8rc1
OR
bestpracticalrtMatch4.0.8rc2
OR
bestpracticalrtMatch4.0.9
OR
bestpracticalrtMatch4.0.10
OR
bestpracticalrtMatch4.0.11
OR
bestpracticalrtMatch4.0.12
Node
bestpracticalrtMatch3.8.0
OR
bestpracticalrtMatch3.8.0preflight1
OR
bestpracticalrtMatch3.8.0rc1
OR
bestpracticalrtMatch3.8.0rc2
OR
bestpracticalrtMatch3.8.0rc3
OR
bestpracticalrtMatch3.8.1
OR
bestpracticalrtMatch3.8.1preflight0
OR
bestpracticalrtMatch3.8.1rc1
OR
bestpracticalrtMatch3.8.1rc2
OR
bestpracticalrtMatch3.8.1rc3
OR
bestpracticalrtMatch3.8.1rc4
OR
bestpracticalrtMatch3.8.1rc5
OR
bestpracticalrtMatch3.8.2
OR
bestpracticalrtMatch3.8.2rc1
OR
bestpracticalrtMatch3.8.2rc2
OR
bestpracticalrtMatch3.8.3
OR
bestpracticalrtMatch3.8.3rc1
OR
bestpracticalrtMatch3.8.3rc2
OR
bestpracticalrtMatch3.8.4
OR
bestpracticalrtMatch3.8.4rc1
OR
bestpracticalrtMatch3.8.5
OR
bestpracticalrtMatch3.8.6
OR
bestpracticalrtMatch3.8.6rc1
OR
bestpracticalrtMatch3.8.7
OR
bestpracticalrtMatch3.8.7rc1
OR
bestpracticalrtMatch3.8.8
OR
bestpracticalrtMatch3.8.8rc2
OR
bestpracticalrtMatch3.8.8rc3
OR
bestpracticalrtMatch3.8.8rc4
OR
bestpracticalrtMatch3.8.9
OR
bestpracticalrtMatch3.8.9rc1
OR
bestpracticalrtMatch3.8.9rc2
OR
bestpracticalrtMatch3.8.9rc3
OR
bestpracticalrtMatch3.8.10
OR
bestpracticalrtMatch3.8.10rc1
OR
bestpracticalrtMatch3.8.11
OR
bestpracticalrtMatch3.8.11rc1
OR
bestpracticalrtMatch3.8.11rc2
OR
bestpracticalrtMatch3.8.12
OR
bestpracticalrtMatch3.8.13
OR
bestpracticalrtMatch3.8.13rc1
OR
bestpracticalrtMatch3.8.13rc2
OR
bestpracticalrtMatch3.8.14
OR
bestpracticalrtMatch3.8.14rc1
OR
bestpracticalrtMatch3.8.15
OR
bestpracticalrtMatch3.8.16

4.3 Medium

CVSS2

Attack Vector

NETWORK

Attack Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

NONE

Availability Impact

NONE

AV:N/AC:M/Au:N/C:P/I:N/A:N

8.2 High

AI Score

Confidence

High

0.003 Low

EPSS

Percentile

69.9%