The vulnerable-passwords script in Best Practical Solutions RT 3.x before 3.8.12 and 4.x before 4.0.6 does not update the password-hash algorithm for disabled user accounts, which makes it easier for context-dependent attackers to determine cleartext passwords, and possibly use these passwords after accounts are re-enabled, via a brute-force attack on the database. NOTE: this vulnerability exists because of an incomplete fix for CVE-2011-0009.
References
Configurations
Configuration 1 (hide)
|
Configuration 2 (hide)
|
History
21 Nov 2024, 01:27
Type | Values Removed | Values Added |
---|---|---|
References | () http://lists.bestpractical.com/pipermail/rt-announce/2012-May/000202.html - | |
References | () http://lists.bestpractical.com/pipermail/rt-announce/2012-May/000203.html - Patch | |
References | () http://lists.bestpractical.com/pipermail/rt-announce/2012-May/000204.html - Patch | |
References | () http://secunia.com/advisories/49259 - | |
References | () http://www.securityfocus.com/bid/53660 - |
Information
Published : 2012-06-04 19:55
Updated : 2024-11-21 01:27
NVD link : CVE-2011-2082
Mitre link : CVE-2011-2082
CVE.ORG link : CVE-2011-2082
JSON object : View
Products Affected
bestpractical
- rt
CWE
CWE-255
Credentials Management Errors