CVE-2013-3525
Published May 10, 2013
Last updated 3 months ago
Overview
- Description
- SQL injection vulnerability in Approvals/ in Request Tracker (RT) 4.0.10 and earlier allows remote attackers to execute arbitrary SQL commands via the ShowPending parameter. NOTE: the vendor disputes this issue, stating "We were unable to replicate it, and the individual that reported it retracted their report," and "we had verified that the claimed exploit did not function according to the author's claims.
- Source
- cve@mitre.org
- NVD status
- Modified
- CNA Tags
- disputed
Social media
- Hype score
- Not currently trending
Risk scores
CVSS 2.0
- Type
- Primary
- Base score
- 7.5
- Impact score
- 6.4
- Exploitability score
- 10
- Vector string
- AV:N/AC:L/Au:N/C:P/I:P/A:P
Weaknesses
- nvd@nist.gov
- CWE-89
Configurations
[ { "nodes": [ { "negate": false, "cpeMatch": [ { "criteria": "cpe:2.3:a:bestpractical:request_tracker:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "EB1618AE-1526-4372-B05B-BC67D808AC47", "versionEndIncluding": "4.0.9" }, { "criteria": "cpe:2.3:a:bestpractical:request_tracker:3.6.8:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "0C56979C-C3BE-430D-AFFC-F9C89A907529" }, { "criteria": "cpe:2.3:a:bestpractical:request_tracker:3.6.10:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "9298A97B-D52F-4B1B-9A90-B102B9D22585" }, { "criteria": "cpe:2.3:a:bestpractical:request_tracker:3.6.11:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "47AA840F-9E00-4ABF-BFBC-5ABE88AA0B61" }, { "criteria": "cpe:2.3:a:bestpractical:request_tracker:3.8.3:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "E751355A-5C27-47D5-A501-BE0033BB8E06" }, { "criteria": "cpe:2.3:a:bestpractical:request_tracker:3.8.4:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "FB660C2B-9EAB-45E7-83D4-C61B71A70704" }, { "criteria": "cpe:2.3:a:bestpractical:request_tracker:3.8.7:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "6149929E-AC54-484C-9914-BE5B9011B6C2" }, { "criteria": "cpe:2.3:a:bestpractical:request_tracker:3.8.9:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "96D2D87E-2C68-44F7-B8C5-922452742A4B" }, { "criteria": "cpe:2.3:a:bestpractical:request_tracker:3.8.10:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "FDD49949-14EC-4023-8FC5-6BDC5EC64991" }, { "criteria": "cpe:2.3:a:bestpractical:request_tracker:3.8.11:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "8BF47625-80E7-4B73-8C93-8E022AC2703B" }, { "criteria": "cpe:2.3:a:bestpractical:request_tracker:3.8.12:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "C24F467B-2654-4ED4-B1C9-66BE6D263C72" }, { "criteria": "cpe:2.3:a:bestpractical:request_tracker:3.8.13:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "5947B639-9DA1-401A-A227-31A065B4C1A7" }, { "criteria": "cpe:2.3:a:bestpractical:request_tracker:3.8.14:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "E53B005E-8714-4E5D-B026-E22C7FA6DCEA" }, { "criteria": "cpe:2.3:a:bestpractical:request_tracker:3.8.15:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "D8B688DE-4F85-4E2C-AC11-03B7AEE52389" }, { "criteria": "cpe:2.3:a:bestpractical:request_tracker:3.8.16:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "47951328-8CC4-4BD9-ACB7-5D3543305455" }, { "criteria": "cpe:2.3:a:bestpractical:request_tracker:4.0.0:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "44234832-170D-43E0-9643-19CE57378721" }, { "criteria": "cpe:2.3:a:bestpractical:request_tracker:4.0.1:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "38CFCCD6-6C5D-41CD-B7FB-D925A46E615C" }, { "criteria": "cpe:2.3:a:bestpractical:request_tracker:4.0.2:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "814172FB-6F34-4356-8105-70AEBE0B6F6B" }, { "criteria": "cpe:2.3:a:bestpractical:request_tracker:4.0.3:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "D282AC9F-E087-4D8D-B467-1D9480B3ABDA" }, { "criteria": "cpe:2.3:a:bestpractical:request_tracker:4.0.4:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "42F21EB3-8CE6-4F87-A5DE-A01AA32B943F" }, { "criteria": "cpe:2.3:a:bestpractical:request_tracker:4.0.5:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "5EDB4AD7-96B5-4D72-8C51-23D744D10C46" }, { "criteria": "cpe:2.3:a:bestpractical:request_tracker:4.0.6:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "0096B700-17B5-4158-A736-ECFDF9E9935B" }, { "criteria": "cpe:2.3:a:bestpractical:request_tracker:4.0.7:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "A0AF4515-6DB1-406A-878C-6DB32D021BA0" }, { "criteria": "cpe:2.3:a:bestpractical:request_tracker:4.0.8:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "54781FF6-D6DC-40A0-BE84-4D0FA3321280" } ], "operator": "OR" } ] } ]