Show plain JSON{"configurations": [{"nodes": [{"cpeMatch": [{"criteria": "cpe:2.3:a:bestpractical:rt:3.8.12:*:*:*:*:*:*:*", "matchCriteriaId": "C35364B8-6BB7-439D-9450-08FB11639E76", "vulnerable": true}, {"criteria": "cpe:2.3:a:bestpractical:rt:4.0.0:*:*:*:*:*:*:*", "matchCriteriaId": "F84987A7-103B-4473-9D4F-9F28880F6D9F", "vulnerable": true}, {"criteria": "cpe:2.3:a:bestpractical:rt:4.0.0:rc1:*:*:*:*:*:*", "matchCriteriaId": "9E220C7C-D32C-4ED1-A056-074576B7B504", "vulnerable": true}, {"criteria": "cpe:2.3:a:bestpractical:rt:4.0.0:rc2:*:*:*:*:*:*", "matchCriteriaId": "57A903C6-3C9F-47A0-92F7-D5272B2622AC", "vulnerable": true}, {"criteria": "cpe:2.3:a:bestpractical:rt:4.0.0:rc3:*:*:*:*:*:*", "matchCriteriaId": "67EBD0AE-1A91-4690-8A07-0FB7342768FE", "vulnerable": true}, {"criteria": "cpe:2.3:a:bestpractical:rt:4.0.0:rc4:*:*:*:*:*:*", "matchCriteriaId": "A1217A3C-2302-4E3B-BF35-4B16271A6FF6", "vulnerable": true}, {"criteria": "cpe:2.3:a:bestpractical:rt:4.0.0:rc5:*:*:*:*:*:*", "matchCriteriaId": "A72E5649-26E5-47DE-9CB4-019FEC8AF13E", "vulnerable": true}, {"criteria": "cpe:2.3:a:bestpractical:rt:4.0.0:rc6:*:*:*:*:*:*", "matchCriteriaId": "51E06E3C-4504-4325-BD89-9102315858C4", "vulnerable": true}, {"criteria": "cpe:2.3:a:bestpractical:rt:4.0.0:rc7:*:*:*:*:*:*", "matchCriteriaId": "8A1286FE-DB7C-48B1-82A9-A23C82984A21", "vulnerable": true}, {"criteria": "cpe:2.3:a:bestpractical:rt:4.0.0:rc8:*:*:*:*:*:*", "matchCriteriaId": "5C89298A-DA7A-4DDD-A420-5B5BC0ABAF7E", "vulnerable": true}, {"criteria": "cpe:2.3:a:bestpractical:rt:4.0.1:*:*:*:*:*:*:*", "matchCriteriaId": "60F0CE6D-3DFA-4432-9615-78718C1D5583", "vulnerable": true}, {"criteria": "cpe:2.3:a:bestpractical:rt:4.0.2:*:*:*:*:*:*:*", "matchCriteriaId": "A65F27F5-D134-4B94-BF93-CE32065B75B2", "vulnerable": true}, {"criteria": "cpe:2.3:a:bestpractical:rt:4.0.3:*:*:*:*:*:*:*", "matchCriteriaId": "E1D6E744-5181-4E94-8B9B-3CA83648C7A7", "vulnerable": true}, {"criteria": "cpe:2.3:a:bestpractical:rt:4.0.4:*:*:*:*:*:*:*", "matchCriteriaId": "5315BD2E-AE5F-49F9-8451-0D2D64CE56B1", "vulnerable": true}, {"criteria": "cpe:2.3:a:bestpractical:rt:4.0.5:*:*:*:*:*:*:*", "matchCriteriaId": "087B001A-78B6-46EB-8623-D8C680243867", "vulnerable": true}], "negate": false, "operator": "OR"}]}], "cveTags": [], "descriptions": [{"lang": "en", "value": "Best Practical Solutions RT 4.x before 4.0.6 does not properly implement the DisallowExecuteCode option, which allows remote authenticated users to bypass intended access restrictions and execute arbitrary code by leveraging access to a privileged account, a different vulnerability than CVE-2011-4458 and CVE-2011-5092."}, {"lang": "es", "value": "Best Practical Solutions RT 4.x anteriores a 4.0.6 no implementa apropiadamente la opci\u00f3n DisallowExecuteCode, lo que permite a usuarios autenticados remotos evitar las restricciones de acceso previstas y ejecutar c\u00f3digo arbitrario utilizando el acceso a una cuenta con privilegios. Una vulnerabilidad distinta a la CVE-2011-4458 y CVE-2011-5092."}], "id": "CVE-2011-5093", "lastModified": "2025-04-11T00:51:21.963", "metrics": {"cvssMetricV2": [{"acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": {"accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "PARTIAL", "baseScore": 6.5, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:S/C:P/I:P/A:P", "version": "2.0"}, "exploitabilityScore": 8.0, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false}]}, "published": "2012-06-04T19:55:01.947", "references": [{"source": "cve@mitre.org", "tags": ["Patch"], "url": "http://lists.bestpractical.com/pipermail/rt-announce/2012-May/000202.html"}, {"source": "cve@mitre.org", "tags": ["Patch"], "url": "http://lists.bestpractical.com/pipermail/rt-announce/2012-May/000203.html"}, {"source": "cve@mitre.org", "tags": ["Patch"], "url": "http://lists.bestpractical.com/pipermail/rt-announce/2012-May/000204.html"}, {"source": "af854a3a-2127-422b-91ae-364da2661108", "tags": ["Patch"], "url": "http://lists.bestpractical.com/pipermail/rt-announce/2012-May/000202.html"}, {"source": "af854a3a-2127-422b-91ae-364da2661108", "tags": ["Patch"], "url": "http://lists.bestpractical.com/pipermail/rt-announce/2012-May/000203.html"}, {"source": "af854a3a-2127-422b-91ae-364da2661108", "tags": ["Patch"], "url": "http://lists.bestpractical.com/pipermail/rt-announce/2012-May/000204.html"}], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Deferred", "weaknesses": [{"description": [{"lang": "en", "value": "CWE-264"}], "source": "nvd@nist.gov", "type": "Primary"}]}