CVE-2011-5093

Best Practical Solutions RT 4.x before 4.0.6 does not properly implement the DisallowExecuteCode option, which allows remote authenticated users to bypass intended access restrictions and execute arbitrary code by leveraging access to a privileged account, a different vulnerability than CVE-2011-4458 and CVE-2011-5092.
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:bestpractical:rt:3.8.12:*:*:*:*:*:*:*
cpe:2.3:a:bestpractical:rt:4.0.0:*:*:*:*:*:*:*
cpe:2.3:a:bestpractical:rt:4.0.0:rc1:*:*:*:*:*:*
cpe:2.3:a:bestpractical:rt:4.0.0:rc2:*:*:*:*:*:*
cpe:2.3:a:bestpractical:rt:4.0.0:rc3:*:*:*:*:*:*
cpe:2.3:a:bestpractical:rt:4.0.0:rc4:*:*:*:*:*:*
cpe:2.3:a:bestpractical:rt:4.0.0:rc5:*:*:*:*:*:*
cpe:2.3:a:bestpractical:rt:4.0.0:rc6:*:*:*:*:*:*
cpe:2.3:a:bestpractical:rt:4.0.0:rc7:*:*:*:*:*:*
cpe:2.3:a:bestpractical:rt:4.0.0:rc8:*:*:*:*:*:*
cpe:2.3:a:bestpractical:rt:4.0.1:*:*:*:*:*:*:*
cpe:2.3:a:bestpractical:rt:4.0.2:*:*:*:*:*:*:*
cpe:2.3:a:bestpractical:rt:4.0.3:*:*:*:*:*:*:*
cpe:2.3:a:bestpractical:rt:4.0.4:*:*:*:*:*:*:*
cpe:2.3:a:bestpractical:rt:4.0.5:*:*:*:*:*:*:*

History

21 Nov 2024, 01:33

Type Values Removed Values Added
References () http://lists.bestpractical.com/pipermail/rt-announce/2012-May/000202.html - Patch () http://lists.bestpractical.com/pipermail/rt-announce/2012-May/000202.html - Patch
References () http://lists.bestpractical.com/pipermail/rt-announce/2012-May/000203.html - Patch () http://lists.bestpractical.com/pipermail/rt-announce/2012-May/000203.html - Patch
References () http://lists.bestpractical.com/pipermail/rt-announce/2012-May/000204.html - Patch () http://lists.bestpractical.com/pipermail/rt-announce/2012-May/000204.html - Patch

Information

Published : 2012-06-04 19:55

Updated : 2024-11-21 01:33


NVD link : CVE-2011-5093

Mitre link : CVE-2011-5093

CVE.ORG link : CVE-2011-5093


JSON object : View

Products Affected

bestpractical

  • rt
CWE
CWE-264

Permissions, Privileges, and Access Controls