Bug 538173 (CVE-2009-3892) - CVE-2009-3892 Request Tracker XSS flaw
Summary: CVE-2009-3892 Request Tracker XSS flaw
Keywords:
Status: CLOSED DUPLICATE of bug 526870
Alias: CVE-2009-3892
Product: Security Response
Classification: Other
Component: vulnerability
Version: unspecified
Hardware: All
OS: Linux
medium
medium
Target Milestone: ---
Assignee: Red Hat Product Security
QA Contact:
URL: http://web.nvd.nist.gov/view/vuln/det...
Whiteboard:
Depends On: 538174 538175 538176 538177
Blocks:
TreeView+ depends on / blocked
 
Reported: 2009-11-17 20:20 UTC by Josh Bressers
Modified: 2019-09-29 12:33 UTC (History)
2 users (show)

Fixed In Version:
Clone Of:
Environment:
Last Closed: 2009-11-18 02:40:08 UTC
Embargoed:


Attachments (Terms of Use)

Description Josh Bressers 2009-11-17 20:20:28 UTC
Cross-site scripting (XSS) vulnerability in Best Practical Solutions
RT 3.6.x before 3.6.9, 3.8.x before 3.8.5, and other 3.4.6 through
3.8.4 versions allows remote attackers to inject arbitrary web script
or HTML via certain Custom Fields.

Reference: URL:http://www.openwall.com/lists/oss-security/2009/11/15/1
Reference: URL:http://www.openwall.com/lists/oss-security/2009/11/16/4
Reference: URL:http://lists.bestpractical.com/pipermail/rt-announce/2009-September/000172.html
Reference: URL:http://lists.bestpractical.com/pipermail/rt-announce/2009-September/000173.html
Reference: CONFIRM:http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=546778

Comment 1 Josh Bressers 2009-11-17 20:21:10 UTC
Created rt3 tracking bugs for this issue

CVE-2009-3892 Affects: F10 [bug #538174]
CVE-2009-3892 Affects: F11 [bug #538175]
CVE-2009-3892 Affects: F12 [bug #538176]
CVE-2009-3892 Affects: Fdevel [bug #538177]

Comment 2 Ralf Corsepius 2009-11-18 02:40:08 UTC
This issue had been addressed ca 4 weeks ago and had been tracked as 
BZ526870

Then, rawhide had been upgraded to rt3.8.5, while the patch posted in
http://lists.bestpractical.com/pipermail/rt-announce/2009-September/000172.html
had been applied to FC < 12.

*** This bug has been marked as a duplicate of bug 526870 ***


Note You need to log in before you can comment on or make changes to this bug.