Debian DSA-2220-1 : request-tracker3.6, request-tracker3.8 - several vulnerabilities

medium Nessus Plugin ID 53495

Synopsis

The remote Debian host is missing a security-related update.

Description

Several vulnerabilities were discovered in Request Tracker, an issue tracking system.

- CVE-2011-1685 If the external custom field feature is enabled, Request Tracker allows authenticated users to execute arbitrary code with the permissions of the web server, possible triggered by a cross-site request forgery attack.
(External custom fields are disabled by default.)

- CVE-2011-1686 Multiple SQL injection attacks allow authenticated users to obtain data from the database in an unauthorized way.

- CVE-2011-1687 An information leak allows an authenticated privileged user to obtain sensitive information, such as encrypted passwords, via the search interface.

- CVE-2011-1688 When running under certain web servers (such as Lighttpd), Request Tracker is vulnerable to a directory traversal attack, allowing attackers to read any files accessible to the web server. Request Tracker instances running under Apache or Nginx are not affected.

- CVE-2011-1689 Request Tracker contains multiple cross-site scripting vulnerabilities.

- CVE-2011-1690 Request Tracker enables attackers to redirect authentication credentials supplied by legitimate users to third-party servers.

Solution

Upgrade the Request Tracker packages.

For the oldstable distribution (lenny), these problems have been fixed in version 3.6.7-5+lenny6 of the request-tracker3.6 package.

For the stable distribution (squeeze), these problems have been fixed in version 3.8.8-7+squeeze1 of the request-tracker3.8 package.

See Also

https://security-tracker.debian.org/tracker/CVE-2011-1685

https://security-tracker.debian.org/tracker/CVE-2011-1686

https://security-tracker.debian.org/tracker/CVE-2011-1687

https://security-tracker.debian.org/tracker/CVE-2011-1688

https://security-tracker.debian.org/tracker/CVE-2011-1689

https://security-tracker.debian.org/tracker/CVE-2011-1690

https://packages.debian.org/source/squeeze/request-tracker3.8

https://www.debian.org/security/2011/dsa-2220

Plugin Details

Severity: Medium

ID: 53495

File Name: debian_DSA-2220.nasl

Version: 1.12

Type: local

Agent: unix

Published: 4/20/2011

Updated: 1/4/2021

Supported Sensors: Agentless Assessment, Continuous Assessment, Frictionless Assessment Agent, Nessus Agent, Nessus

Risk Information

VPR

Risk Factor: Medium

Score: 5.8

CVSS v2

Risk Factor: Medium

Base Score: 6.5

Temporal Score: 4.8

Vector: CVSS2#AV:N/AC:L/Au:S/C:P/I:P/A:P

Vulnerability Information

CPE: p-cpe:/a:debian:debian_linux:request-tracker3.8, cpe:/o:debian:debian_linux:6.0, p-cpe:/a:debian:debian_linux:request-tracker3.6, cpe:/o:debian:debian_linux:5.0

Required KB Items: Host/local_checks_enabled, Host/Debian/release, Host/Debian/dpkg-l

Exploit Ease: No known exploits are available

Patch Publication Date: 4/19/2011

Reference Information

CVE: CVE-2011-1685, CVE-2011-1686, CVE-2011-1687, CVE-2011-1688, CVE-2011-1689, CVE-2011-1690

BID: 47383

DSA: 2220