Request Tracker (RT) 3.8.x before 3.8.15 and 4.0.x before 4.0.8 allows remote attackers to conduct a "confused deputy" attack to bypass the CSRF warning protection mechanism and cause victims to "modify arbitrary state" via unknown vectors related to a crafted link.
2012-11-11T13:00:59.510
2025-04-11T00:51:21.963
Deferred
CVSSv2: 5.0 (MEDIUM)
AV:N/AC:L/Au:N/C:N/I:P/A:N
10.0
2.9
Type | Vendor | Product | Version/Range | Vulnerable? |
---|---|---|---|---|
Application | bestpractical | rt | 3.8.0 | Yes |
Application | bestpractical | rt | 3.8.0 | Yes |
Application | bestpractical | rt | 3.8.0 | Yes |
Application | bestpractical | rt | 3.8.0 | Yes |
Application | bestpractical | rt | 3.8.0 | Yes |
Application | bestpractical | rt | 3.8.1 | Yes |
Application | bestpractical | rt | 3.8.1 | Yes |
Application | bestpractical | rt | 3.8.1 | Yes |
Application | bestpractical | rt | 3.8.1 | Yes |
Application | bestpractical | rt | 3.8.1 | Yes |
Application | bestpractical | rt | 3.8.1 | Yes |
Application | bestpractical | rt | 3.8.1 | Yes |
Application | bestpractical | rt | 3.8.2 | Yes |
Application | bestpractical | rt | 3.8.2 | Yes |
Application | bestpractical | rt | 3.8.2 | Yes |
Application | bestpractical | rt | 3.8.3 | Yes |
Application | bestpractical | rt | 3.8.3 | Yes |
Application | bestpractical | rt | 3.8.3 | Yes |
Application | bestpractical | rt | 3.8.4 | Yes |
Application | bestpractical | rt | 3.8.4 | Yes |
Application | bestpractical | rt | 3.8.5 | Yes |
Application | bestpractical | rt | 3.8.6 | Yes |
Application | bestpractical | rt | 3.8.6 | Yes |
Application | bestpractical | rt | 3.8.7 | Yes |
Application | bestpractical | rt | 3.8.7 | Yes |
Application | bestpractical | rt | 3.8.8 | Yes |
Application | bestpractical | rt | 3.8.8 | Yes |
Application | bestpractical | rt | 3.8.8 | Yes |
Application | bestpractical | rt | 3.8.8 | Yes |
Application | bestpractical | rt | 3.8.9 | Yes |
Application | bestpractical | rt | 3.8.9 | Yes |
Application | bestpractical | rt | 3.8.9 | Yes |
Application | bestpractical | rt | 3.8.9 | Yes |
Application | bestpractical | rt | 3.8.10 | Yes |
Application | bestpractical | rt | 3.8.10 | Yes |
Application | bestpractical | rt | 3.8.11 | Yes |
Application | bestpractical | rt | 3.8.11 | Yes |
Application | bestpractical | rt | 3.8.11 | Yes |
Application | bestpractical | rt | 3.8.12 | Yes |
Application | bestpractical | rt | 3.8.13 | Yes |
Application | bestpractical | rt | 3.8.13 | Yes |
Application | bestpractical | rt | 3.8.14 | Yes |
Application | bestpractical | rt | 4.0.0 | Yes |
Application | bestpractical | rt | 4.0.0 | Yes |
Application | bestpractical | rt | 4.0.0 | Yes |
Application | bestpractical | rt | 4.0.0 | Yes |
Application | bestpractical | rt | 4.0.0 | Yes |
Application | bestpractical | rt | 4.0.0 | Yes |
Application | bestpractical | rt | 4.0.0 | Yes |
Application | bestpractical | rt | 4.0.0 | Yes |
Application | bestpractical | rt | 4.0.0 | Yes |
Application | bestpractical | rt | 4.0.1 | Yes |
Application | bestpractical | rt | 4.0.1 | Yes |
Application | bestpractical | rt | 4.0.1 | Yes |
Application | bestpractical | rt | 4.0.2 | Yes |
Application | bestpractical | rt | 4.0.2 | Yes |
Application | bestpractical | rt | 4.0.2 | Yes |
Application | bestpractical | rt | 4.0.3 | Yes |
Application | bestpractical | rt | 4.0.3 | Yes |
Application | bestpractical | rt | 4.0.3 | Yes |
Application | bestpractical | rt | 4.0.4 | Yes |
Application | bestpractical | rt | 4.0.5 | Yes |
Application | bestpractical | rt | 4.0.5 | Yes |
Application | bestpractical | rt | 4.0.6 | Yes |
Application | bestpractical | rt | 4.0.7 | Yes |
Application | bestpractical | rt | 4.0.8 | Yes |
Application | bestpractical | rt | 4.0.8 | Yes |