Vulnerability Details CVE-2012-6578
Best Practical Solutions RT 3.8.x before 3.8.15 and 4.0.x before 4.0.8, when GnuPG is enabled with a "Sign by default" queue configuration, uses a queue's key for signing, which might allow remote attackers to spoof messages by leveraging the lack of authentication semantics.
Exploit prediction scoring system (EPSS) score
EPSS Score 0.003
EPSS Ranking 49.0%
CVSS Severity
CVSS v2 Score 4.3
Products affected by CVE-2012-6578
-
cpe:2.3:a:bestpractical:request_tracker:3.8.10
-
cpe:2.3:a:bestpractical:request_tracker:3.8.11
-
cpe:2.3:a:bestpractical:request_tracker:3.8.12
-
cpe:2.3:a:bestpractical:request_tracker:3.8.13
-
cpe:2.3:a:bestpractical:request_tracker:3.8.14
-
cpe:2.3:a:bestpractical:request_tracker:3.8.3
-
cpe:2.3:a:bestpractical:request_tracker:3.8.4
-
cpe:2.3:a:bestpractical:request_tracker:3.8.7
-
cpe:2.3:a:bestpractical:request_tracker:3.8.9
-
cpe:2.3:a:bestpractical:request_tracker:4.0.0
-
cpe:2.3:a:bestpractical:request_tracker:4.0.1
-
cpe:2.3:a:bestpractical:request_tracker:4.0.2
-
cpe:2.3:a:bestpractical:request_tracker:4.0.3
-
cpe:2.3:a:bestpractical:request_tracker:4.0.4
-
cpe:2.3:a:bestpractical:request_tracker:4.0.5
-
cpe:2.3:a:bestpractical:request_tracker:4.0.6
-
cpe:2.3:a:bestpractical:request_tracker:4.0.7