Show plain JSON{"configurations": [{"nodes": [{"cpeMatch": [{"criteria": "cpe:2.3:a:bestpractical:rt:4.0.0:*:*:*:*:*:*:*", "matchCriteriaId": "F84987A7-103B-4473-9D4F-9F28880F6D9F", "vulnerable": true}, {"criteria": "cpe:2.3:a:bestpractical:rt:4.0.0:rc1:*:*:*:*:*:*", "matchCriteriaId": "9E220C7C-D32C-4ED1-A056-074576B7B504", "vulnerable": true}, {"criteria": "cpe:2.3:a:bestpractical:rt:4.0.0:rc2:*:*:*:*:*:*", "matchCriteriaId": "57A903C6-3C9F-47A0-92F7-D5272B2622AC", "vulnerable": true}, {"criteria": "cpe:2.3:a:bestpractical:rt:4.0.0:rc3:*:*:*:*:*:*", "matchCriteriaId": "67EBD0AE-1A91-4690-8A07-0FB7342768FE", "vulnerable": true}, {"criteria": "cpe:2.3:a:bestpractical:rt:4.0.0:rc4:*:*:*:*:*:*", "matchCriteriaId": "A1217A3C-2302-4E3B-BF35-4B16271A6FF6", "vulnerable": true}, {"criteria": "cpe:2.3:a:bestpractical:rt:4.0.0:rc5:*:*:*:*:*:*", "matchCriteriaId": "A72E5649-26E5-47DE-9CB4-019FEC8AF13E", "vulnerable": true}, {"criteria": "cpe:2.3:a:bestpractical:rt:4.0.0:rc6:*:*:*:*:*:*", "matchCriteriaId": "51E06E3C-4504-4325-BD89-9102315858C4", "vulnerable": true}, {"criteria": "cpe:2.3:a:bestpractical:rt:4.0.0:rc7:*:*:*:*:*:*", "matchCriteriaId": "8A1286FE-DB7C-48B1-82A9-A23C82984A21", "vulnerable": true}, {"criteria": "cpe:2.3:a:bestpractical:rt:4.0.0:rc8:*:*:*:*:*:*", "matchCriteriaId": "5C89298A-DA7A-4DDD-A420-5B5BC0ABAF7E", "vulnerable": true}, {"criteria": "cpe:2.3:a:bestpractical:rt:4.0.1:*:*:*:*:*:*:*", "matchCriteriaId": "60F0CE6D-3DFA-4432-9615-78718C1D5583", "vulnerable": true}, {"criteria": "cpe:2.3:a:bestpractical:rt:4.0.1:rc1:*:*:*:*:*:*", "matchCriteriaId": "F478B6AB-8B47-46A2-BEA7-9FF24F4A7026", "vulnerable": true}, {"criteria": "cpe:2.3:a:bestpractical:rt:4.0.1:rc2:*:*:*:*:*:*", "matchCriteriaId": "A7CA2655-8B75-4DFF-9B30-1B9839B87D9A", "vulnerable": true}, {"criteria": "cpe:2.3:a:bestpractical:rt:4.0.2:*:*:*:*:*:*:*", "matchCriteriaId": "A65F27F5-D134-4B94-BF93-CE32065B75B2", "vulnerable": true}, {"criteria": "cpe:2.3:a:bestpractical:rt:4.0.2:rc1:*:*:*:*:*:*", "matchCriteriaId": "9D976231-5D79-4C48-BFFA-39E3E7FE35A5", "vulnerable": true}, {"criteria": "cpe:2.3:a:bestpractical:rt:4.0.2:rc2:*:*:*:*:*:*", "matchCriteriaId": "F35ABA0F-6072-433E-AAA5-3B0BB219B404", "vulnerable": true}, {"criteria": "cpe:2.3:a:bestpractical:rt:4.0.3:*:*:*:*:*:*:*", "matchCriteriaId": "E1D6E744-5181-4E94-8B9B-3CA83648C7A7", "vulnerable": true}, {"criteria": "cpe:2.3:a:bestpractical:rt:4.0.10:*:*:*:*:*:*:*", "matchCriteriaId": "15112BC0-8C03-4417-A0EB-123C326E6F34", "vulnerable": true}, {"criteria": "cpe:2.3:a:bestpractical:rt:4.0.11:*:*:*:*:*:*:*", "matchCriteriaId": "685B747F-6C34-4D76-B1A3-652EF2480D5F", "vulnerable": true}, {"criteria": "cpe:2.3:a:bestpractical:rt:4.0.12:*:*:*:*:*:*:*", "matchCriteriaId": "A8E6D6E2-13A1-4AF9-B1A2-414588CCBD35", "vulnerable": true}], "negate": false, "operator": "OR"}]}], "cveTags": [], "descriptions": [{"lang": "en", "value": "Request Tracker (RT) 4.x before 4.0.13 does not properly enforce the DeleteTicket and \"custom lifecycle transition\" permission, which allows remote authenticated users with the ModifyTicket permission to delete tickets via unspecified vectors."}, {"lang": "es", "value": "Request Tracker (RT) v4.x anterior a v4.0.13 no aplica adecuadamente el permiso DeleteTicket y \"la transici\u00f3n del ciclo de vida personalizado\", lo que permite a usuarios remotos autenticados con el permiso ModifyTicket suprimir entradas a trav\u00e9s de vectores no especificados."}], "id": "CVE-2012-4733", "lastModified": "2025-04-11T00:51:21.963", "metrics": {"cvssMetricV2": [{"acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": {"accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "PARTIAL", "baseScore": 6.0, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:S/C:P/I:P/A:P", "version": "2.0"}, "exploitabilityScore": 6.8, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false}]}, "published": "2013-08-23T16:55:06.947", "references": [{"source": "cve@mitre.org", "tags": ["Vendor Advisory"], "url": "http://lists.bestpractical.com/pipermail/rt-announce/2013-May/000226.html"}, {"source": "cve@mitre.org", "tags": ["Patch"], "url": "http://lists.bestpractical.com/pipermail/rt-announce/2013-May/000227.html"}, {"source": "cve@mitre.org", "tags": ["Vendor Advisory"], "url": "http://secunia.com/advisories/53522"}, {"source": "cve@mitre.org", "url": "http://www.osvdb.org/93611"}, {"source": "af854a3a-2127-422b-91ae-364da2661108", "tags": ["Vendor Advisory"], "url": "http://lists.bestpractical.com/pipermail/rt-announce/2013-May/000226.html"}, {"source": "af854a3a-2127-422b-91ae-364da2661108", "tags": ["Patch"], "url": "http://lists.bestpractical.com/pipermail/rt-announce/2013-May/000227.html"}, {"source": "af854a3a-2127-422b-91ae-364da2661108", "tags": ["Vendor Advisory"], "url": "http://secunia.com/advisories/53522"}, {"source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.osvdb.org/93611"}], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Deferred", "weaknesses": [{"description": [{"lang": "en", "value": "CWE-255"}], "source": "nvd@nist.gov", "type": "Primary"}]}