Lucene search

K
nessusThis script is Copyright (C) 2011-2022 Tenable Network Security, Inc.RT_389.NASL
HistoryFeb 25, 2011 - 12:00 a.m.

Request Tracker 3.x < 3.8.9 Security Bypass and Information Disclosure

2011-02-2500:00:00
This script is Copyright (C) 2011-2022 Tenable Network Security, Inc.
www.tenable.com
7

4 Medium

CVSS2

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

SINGLE

Confidentiality Impact

PARTIAL

Integrity Impact

NONE

Availability Impact

NONE

AV:N/AC:L/Au:S/C:P/I:N/A:N

0.003 Low

EPSS

Percentile

65.7%

According to its self-reported version number, the Best Practical Solutions Request Tracker (RT) running on the remote web server is a version prior to 3.8.9. It is, therefore, potentially affected by the following vulnerabilities :

  • If an individual with a valid account logs out of Request Tracker but does not close the browser, an attacker with access to that browser can use the ‘back’ button to access the previous user’s account page.
    (CVE-2011-1007)

  • An information disclosure vulnerability affects the application when handling the logging of SQL queries during user transition. (CVE-2011-1008)

Note that Nessus has not tested for these issues but has instead relied only on the application’s self-reported version number.

#%NASL_MIN_LEVEL 70300
#
# (C) Tenable Network Security, Inc.
#

include('deprecated_nasl_level.inc');
include('compat.inc');

if (description)
{
  script_id(52455);
  script_version("1.13");
  script_set_attribute(attribute:"plugin_modification_date", value:"2022/04/11");

  script_cve_id("CVE-2011-1007", "CVE-2011-1008");
  script_bugtraq_id(46493);
  script_xref(name:"SECUNIA", value:"43438");

  script_name(english:"Request Tracker 3.x < 3.8.9 Security Bypass and Information Disclosure");

  script_set_attribute(attribute:"synopsis", value:
"The remote web server is running a Perl application that is affected
by security bypass and information disclosure vulnerabilities.");
  script_set_attribute(attribute:"description", value:
"According to its self-reported version number, the Best Practical
Solutions Request Tracker (RT) running on the remote web server is a
version prior to 3.8.9. It is, therefore, potentially affected by the
following vulnerabilities :

  - If an individual with a valid account logs out of
    Request Tracker but does not close the browser, an
    attacker with access to that browser can use the 'back'
    button to access the previous user's account page.
    (CVE-2011-1007)

  - An information disclosure vulnerability affects the
    application when handling the logging of SQL queries
    during user transition. (CVE-2011-1008)

Note that Nessus has not tested for these issues but has instead
relied only on the application's self-reported version number.");
  # http://lists.bestpractical.com/pipermail/rt-announce/2011-February/000186.html
  script_set_attribute(attribute:"see_also", value:"http://www.nessus.org/u?c1d8bf43");
  # https://github.com/bestpractical/rt/commit/917c211820590950f7eb0521f7f43b31aeed44c4
  script_set_attribute(attribute:"see_also", value:"http://www.nessus.org/u?1f132438");
  # https://github.com/bestpractical/rt/commit/2338cd19ed7a7f4c1e94f639ab2789d6586d01f3
  script_set_attribute(attribute:"see_also", value:"http://www.nessus.org/u?4bb973f9");
  script_set_attribute(attribute:"solution", value:
"Upgrade to Request Tracker 3.8.9 or later.");
  script_set_cvss_base_vector("CVSS2#AV:N/AC:L/Au:S/C:P/I:N/A:N");
  script_set_cvss_temporal_vector("CVSS2#E:U/RL:OF/RC:C");

  script_set_attribute(attribute:"exploitability_ease", value:"No exploit is required");
  script_set_attribute(attribute:"exploit_available", value:"false");

  script_set_attribute(attribute:"vuln_publication_date", value:"2011/02/16");
  script_set_attribute(attribute:"patch_publication_date", value:"2011/02/16");
  script_set_attribute(attribute:"plugin_publication_date", value:"2011/02/25");

  script_set_attribute(attribute:"potential_vulnerability", value:"true");
  script_set_attribute(attribute:"plugin_type", value:"remote");
  script_set_attribute(attribute:"cpe", value:"cpe:/a:bestpractical:rt");
  script_set_attribute(attribute:"thorough_tests", value:"true");
  script_end_attributes();

  script_category(ACT_GATHER_INFO);
  script_family(english:"CGI abuses");

  script_copyright(english:"This script is Copyright (C) 2011-2022 Tenable Network Security, Inc.");

  script_dependencies("rt_detect.nasl");
  script_require_keys("installed_sw/RT", "Settings/ParanoidReport");
  script_exclude_keys("Settings/disable_cgi_scanning");
  script_require_ports("Services/www", 80);

  exit(0);
}

include("audit.inc");
include("global_settings.inc");
include("misc_func.inc");
include("http.inc");
include("install_func.inc");

app = "RT";
get_install_count(app_name:app, exit_if_zero:TRUE);

port = get_http_port(default:80);

install = get_single_install(app_name:app, port:port, exit_if_unknown_ver:TRUE);

if (report_paranoia < 2) audit(AUDIT_PARANOID);

path = install['path'];
install_url = build_url(port:port, qs:path + "/");
version = install['version'];

# Versions 3.0.0 - 3.8.9rc1 are affected.
if (version =~ "^3\.([0-7]($|[^0-9])|8\.([0-8]($|[^0-9]+[0-9]+)|9rc1))")
{
  if (report_verbosity > 0)
  {
    report =
      '\n  URL               : ' + install_url +
      '\n  Installed version : ' + version +
      '\n  Fixed version     : 3.8.9\n';
    security_warning(port:port, extra:report);
  }
  else security_warning(port);

  exit(0);
}
else audit(AUDIT_WEB_APP_NOT_AFFECTED, app, install_url, version);
VendorProductVersionCPE
bestpracticalrtcpe:/a:bestpractical:rt

4 Medium

CVSS2

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

SINGLE

Confidentiality Impact

PARTIAL

Integrity Impact

NONE

Availability Impact

NONE

AV:N/AC:L/Au:S/C:P/I:N/A:N

0.003 Low

EPSS

Percentile

65.7%