Best Practical Request Tracker (RT) 4.2 before 4.2.17, 4.4 before 4.4.5, and 5.0 before 5.0.2 allows sensitive information disclosure via a timing attack against lib/RT/REST2/Middleware/Auth.pm.
The product behaves differently or sends different responses under different circumstances in a way that is observable to an unauthorized actor, which exposes security-relevant information about the state of the product, such as whether a particular operation was successful or not.
Name | Vendor | Start Version | End Version |
---|---|---|---|
Request_tracker | Bestpractical | 4.2.0 (including) | 4.2.17 (excluding) |
Request_tracker | Bestpractical | 4.4.0 (including) | 4.4.5 (excluding) |
Request_tracker | Bestpractical | 5.0.0 (including) | 5.0.2 (excluding) |
Request-tracker4 | Ubuntu | bionic | * |
Request-tracker4 | Ubuntu | devel | * |
Request-tracker4 | Ubuntu | esm-apps/bionic | * |
Request-tracker4 | Ubuntu | esm-apps/xenial | * |
Request-tracker4 | Ubuntu | focal | * |
Request-tracker4 | Ubuntu | hirsute | * |
Request-tracker4 | Ubuntu | impish | * |
Request-tracker4 | Ubuntu | jammy | * |
Request-tracker4 | Ubuntu | kinetic | * |
Request-tracker4 | Ubuntu | lunar | * |
Request-tracker4 | Ubuntu | mantic | * |
Request-tracker4 | Ubuntu | noble | * |
Request-tracker4 | Ubuntu | oracular | * |
Request-tracker4 | Ubuntu | trusty | * |
Request-tracker4 | Ubuntu | xenial | * |
Request-tracker5 | Ubuntu | impish | * |
Request-tracker5 | Ubuntu | kinetic | * |
Request-tracker5 | Ubuntu | lunar | * |
Request-tracker5 | Ubuntu | mantic | * |
Request-tracker5 | Ubuntu | trusty | * |
Request-tracker5 | Ubuntu | upstream | * |
Request-tracker5 | Ubuntu | xenial | * |