CVE-2013-3371

Cross-site scripting (XSS) vulnerability in Request Tracker (RT) 3.8.3 through 3.8.16 and 4.0.x before 4.0.13 allows remote attackers to inject arbitrary web script or HTML via the filename of an attachment.
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:bestpractical:rt:3.8.0:*:*:*:*:*:*:*
cpe:2.3:a:bestpractical:rt:3.8.0:preflight1:*:*:*:*:*:*
cpe:2.3:a:bestpractical:rt:3.8.0:rc1:*:*:*:*:*:*
cpe:2.3:a:bestpractical:rt:3.8.0:rc2:*:*:*:*:*:*
cpe:2.3:a:bestpractical:rt:3.8.0:rc3:*:*:*:*:*:*
cpe:2.3:a:bestpractical:rt:3.8.1:*:*:*:*:*:*:*
cpe:2.3:a:bestpractical:rt:3.8.1:preflight0:*:*:*:*:*:*
cpe:2.3:a:bestpractical:rt:3.8.1:rc1:*:*:*:*:*:*
cpe:2.3:a:bestpractical:rt:3.8.1:rc2:*:*:*:*:*:*
cpe:2.3:a:bestpractical:rt:3.8.1:rc3:*:*:*:*:*:*
cpe:2.3:a:bestpractical:rt:3.8.1:rc4:*:*:*:*:*:*
cpe:2.3:a:bestpractical:rt:3.8.1:rc5:*:*:*:*:*:*
cpe:2.3:a:bestpractical:rt:3.8.2:*:*:*:*:*:*:*
cpe:2.3:a:bestpractical:rt:3.8.2:rc1:*:*:*:*:*:*
cpe:2.3:a:bestpractical:rt:3.8.2:rc2:*:*:*:*:*:*
cpe:2.3:a:bestpractical:rt:3.8.3:*:*:*:*:*:*:*
cpe:2.3:a:bestpractical:rt:3.8.3:rc1:*:*:*:*:*:*
cpe:2.3:a:bestpractical:rt:3.8.3:rc2:*:*:*:*:*:*
cpe:2.3:a:bestpractical:rt:3.8.4:*:*:*:*:*:*:*
cpe:2.3:a:bestpractical:rt:3.8.4:rc1:*:*:*:*:*:*
cpe:2.3:a:bestpractical:rt:3.8.5:*:*:*:*:*:*:*
cpe:2.3:a:bestpractical:rt:3.8.6:*:*:*:*:*:*:*
cpe:2.3:a:bestpractical:rt:3.8.6:rc1:*:*:*:*:*:*
cpe:2.3:a:bestpractical:rt:3.8.7:*:*:*:*:*:*:*
cpe:2.3:a:bestpractical:rt:3.8.7:rc1:*:*:*:*:*:*
cpe:2.3:a:bestpractical:rt:3.8.8:*:*:*:*:*:*:*
cpe:2.3:a:bestpractical:rt:3.8.8:rc2:*:*:*:*:*:*
cpe:2.3:a:bestpractical:rt:3.8.8:rc3:*:*:*:*:*:*
cpe:2.3:a:bestpractical:rt:3.8.8:rc4:*:*:*:*:*:*
cpe:2.3:a:bestpractical:rt:3.8.9:*:*:*:*:*:*:*
cpe:2.3:a:bestpractical:rt:3.8.9:rc1:*:*:*:*:*:*
cpe:2.3:a:bestpractical:rt:3.8.9:rc2:*:*:*:*:*:*
cpe:2.3:a:bestpractical:rt:3.8.9:rc3:*:*:*:*:*:*
cpe:2.3:a:bestpractical:rt:3.8.10:*:*:*:*:*:*:*
cpe:2.3:a:bestpractical:rt:3.8.10:rc1:*:*:*:*:*:*
cpe:2.3:a:bestpractical:rt:3.8.11:*:*:*:*:*:*:*
cpe:2.3:a:bestpractical:rt:3.8.11:rc1:*:*:*:*:*:*
cpe:2.3:a:bestpractical:rt:3.8.11:rc2:*:*:*:*:*:*
cpe:2.3:a:bestpractical:rt:3.8.12:*:*:*:*:*:*:*
cpe:2.3:a:bestpractical:rt:3.8.13:*:*:*:*:*:*:*
cpe:2.3:a:bestpractical:rt:3.8.13:rc1:*:*:*:*:*:*
cpe:2.3:a:bestpractical:rt:3.8.13:rc2:*:*:*:*:*:*
cpe:2.3:a:bestpractical:rt:3.8.14:*:*:*:*:*:*:*
cpe:2.3:a:bestpractical:rt:3.8.14:rc1:*:*:*:*:*:*
cpe:2.3:a:bestpractical:rt:3.8.15:*:*:*:*:*:*:*
cpe:2.3:a:bestpractical:rt:3.8.16:*:*:*:*:*:*:*

Configuration 2 (hide)

OR cpe:2.3:a:bestpractical:rt:4.0.0:*:*:*:*:*:*:*
cpe:2.3:a:bestpractical:rt:4.0.0:rc1:*:*:*:*:*:*
cpe:2.3:a:bestpractical:rt:4.0.0:rc2:*:*:*:*:*:*
cpe:2.3:a:bestpractical:rt:4.0.0:rc3:*:*:*:*:*:*
cpe:2.3:a:bestpractical:rt:4.0.0:rc4:*:*:*:*:*:*
cpe:2.3:a:bestpractical:rt:4.0.0:rc5:*:*:*:*:*:*
cpe:2.3:a:bestpractical:rt:4.0.0:rc6:*:*:*:*:*:*
cpe:2.3:a:bestpractical:rt:4.0.0:rc7:*:*:*:*:*:*
cpe:2.3:a:bestpractical:rt:4.0.0:rc8:*:*:*:*:*:*
cpe:2.3:a:bestpractical:rt:4.0.1:*:*:*:*:*:*:*
cpe:2.3:a:bestpractical:rt:4.0.1:rc1:*:*:*:*:*:*
cpe:2.3:a:bestpractical:rt:4.0.1:rc2:*:*:*:*:*:*
cpe:2.3:a:bestpractical:rt:4.0.2:*:*:*:*:*:*:*
cpe:2.3:a:bestpractical:rt:4.0.2:rc1:*:*:*:*:*:*
cpe:2.3:a:bestpractical:rt:4.0.2:rc2:*:*:*:*:*:*
cpe:2.3:a:bestpractical:rt:4.0.3:*:*:*:*:*:*:*
cpe:2.3:a:bestpractical:rt:4.0.3:rc1:*:*:*:*:*:*
cpe:2.3:a:bestpractical:rt:4.0.3:rc2:*:*:*:*:*:*
cpe:2.3:a:bestpractical:rt:4.0.4:*:*:*:*:*:*:*
cpe:2.3:a:bestpractical:rt:4.0.5:*:*:*:*:*:*:*
cpe:2.3:a:bestpractical:rt:4.0.5:rc1:*:*:*:*:*:*
cpe:2.3:a:bestpractical:rt:4.0.6:*:*:*:*:*:*:*
cpe:2.3:a:bestpractical:rt:4.0.7:*:*:*:*:*:*:*
cpe:2.3:a:bestpractical:rt:4.0.7:rc1:*:*:*:*:*:*
cpe:2.3:a:bestpractical:rt:4.0.8:*:*:*:*:*:*:*
cpe:2.3:a:bestpractical:rt:4.0.8:rc1:*:*:*:*:*:*
cpe:2.3:a:bestpractical:rt:4.0.8:rc2:*:*:*:*:*:*
cpe:2.3:a:bestpractical:rt:4.0.9:*:*:*:*:*:*:*
cpe:2.3:a:bestpractical:rt:4.0.10:*:*:*:*:*:*:*
cpe:2.3:a:bestpractical:rt:4.0.11:*:*:*:*:*:*:*
cpe:2.3:a:bestpractical:rt:4.0.12:*:*:*:*:*:*:*

History

21 Nov 2024, 01:53

Type Values Removed Values Added
References () http://lists.bestpractical.com/pipermail/rt-announce/2013-May/000226.html - Patch () http://lists.bestpractical.com/pipermail/rt-announce/2013-May/000226.html - Patch
References () http://lists.bestpractical.com/pipermail/rt-announce/2013-May/000227.html - Patch () http://lists.bestpractical.com/pipermail/rt-announce/2013-May/000227.html - Patch
References () http://lists.bestpractical.com/pipermail/rt-announce/2013-May/000228.html - Patch () http://lists.bestpractical.com/pipermail/rt-announce/2013-May/000228.html - Patch
References () http://secunia.com/advisories/53505 - Vendor Advisory () http://secunia.com/advisories/53505 - Vendor Advisory
References () http://secunia.com/advisories/53522 - Vendor Advisory () http://secunia.com/advisories/53522 - Vendor Advisory
References () http://www.debian.org/security/2012/dsa-2670 - () http://www.debian.org/security/2012/dsa-2670 -
References () http://www.osvdb.org/93608 - () http://www.osvdb.org/93608 -

Information

Published : 2013-08-23 16:55

Updated : 2024-11-21 01:53


NVD link : CVE-2013-3371

Mitre link : CVE-2013-3371

CVE.ORG link : CVE-2013-3371


JSON object : View

Products Affected

bestpractical

  • rt
CWE
CWE-79

Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')