Information exposure vulnerability in Request Tracker (RT)

Posted date 04/04/2024
Importance
3 - Medium
Affected Resources
  • Request Tracker, 4.4.1 version.
Description

INCIBE has coordinated the publication of a medium severity vulnerability affecting RT version 4.4.1, a tool developed by Best Practical Solutions for cyber incident management, which has been discovered by Javier Garcia Antón.

This vulnerability has been assigned the following code, CVSS v3.1 base score, CVSS vector and vulnerability type CWE:

  • CVE-2024-3262: 5.5 | CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N | CWE-200
Solution

Vulnerability fixed by applying the following patches:

In future versions of RT, this solution will be included as a configurable option of the tool.

Detail

CVE-2024-3262: information exposure vulnerability in RT software affecting version 4.4.1. This vulnerability allows an attacker with local access to the device to retrieve sensitive information about the application, such as vulnerability tickets, because the application stores the information in the browser cache, leading to information exposure despite session termination.

References list