VYPR
High severity8.8NVD Advisory· Published Jul 3, 2017· Updated May 13, 2026

CVE-2017-5944

CVE-2017-5944

Description

The dashboard subscription interface in Request Tracker (RT) 4.x before 4.0.25, 4.2.x before 4.2.14, and 4.4.x before 4.4.2 might allow remote authenticated users with certain privileges to execute arbitrary code via a crafted saved search name.

Affected products

41
  • cpe:2.3:a:bestpractical:request_tracker:4.0.0:*:*:*:*:*:*:*+ 40 more
    • cpe:2.3:a:bestpractical:request_tracker:4.0.0:*:*:*:*:*:*:*
    • cpe:2.3:a:bestpractical:request_tracker:4.0.1:*:*:*:*:*:*:*
    • cpe:2.3:a:bestpractical:request_tracker:4.0.10:*:*:*:*:*:*:*
    • cpe:2.3:a:bestpractical:request_tracker:4.0.11:*:*:*:*:*:*:*
    • cpe:2.3:a:bestpractical:request_tracker:4.0.12:*:*:*:*:*:*:*
    • cpe:2.3:a:bestpractical:request_tracker:4.0.13:*:*:*:*:*:*:*
    • cpe:2.3:a:bestpractical:request_tracker:4.0.14:*:*:*:*:*:*:*
    • cpe:2.3:a:bestpractical:request_tracker:4.0.15:*:*:*:*:*:*:*
    • cpe:2.3:a:bestpractical:request_tracker:4.0.16:*:*:*:*:*:*:*
    • cpe:2.3:a:bestpractical:request_tracker:4.0.17:*:*:*:*:*:*:*
    • cpe:2.3:a:bestpractical:request_tracker:4.0.18:*:*:*:*:*:*:*
    • cpe:2.3:a:bestpractical:request_tracker:4.0.19:*:*:*:*:*:*:*
    • cpe:2.3:a:bestpractical:request_tracker:4.0.2:*:*:*:*:*:*:*
    • cpe:2.3:a:bestpractical:request_tracker:4.0.20:*:*:*:*:*:*:*
    • cpe:2.3:a:bestpractical:request_tracker:4.0.21:*:*:*:*:*:*:*
    • cpe:2.3:a:bestpractical:request_tracker:4.0.22:*:*:*:*:*:*:*
    • cpe:2.3:a:bestpractical:request_tracker:4.0.23:*:*:*:*:*:*:*
    • cpe:2.3:a:bestpractical:request_tracker:4.0.24:*:*:*:*:*:*:*
    • cpe:2.3:a:bestpractical:request_tracker:4.0.3:*:*:*:*:*:*:*
    • cpe:2.3:a:bestpractical:request_tracker:4.0.4:*:*:*:*:*:*:*
    • cpe:2.3:a:bestpractical:request_tracker:4.0.5:*:*:*:*:*:*:*
    • cpe:2.3:a:bestpractical:request_tracker:4.0.6:*:*:*:*:*:*:*
    • cpe:2.3:a:bestpractical:request_tracker:4.0.7:*:*:*:*:*:*:*
    • cpe:2.3:a:bestpractical:request_tracker:4.0.8:*:*:*:*:*:*:*
    • cpe:2.3:a:bestpractical:request_tracker:4.0.9:*:*:*:*:*:*:*
    • cpe:2.3:a:bestpractical:request_tracker:4.2.0:*:*:*:*:*:*:*
    • cpe:2.3:a:bestpractical:request_tracker:4.2.1:*:*:*:*:*:*:*
    • cpe:2.3:a:bestpractical:request_tracker:4.2.10:*:*:*:*:*:*:*
    • cpe:2.3:a:bestpractical:request_tracker:4.2.11:*:*:*:*:*:*:*
    • cpe:2.3:a:bestpractical:request_tracker:4.2.12:*:*:*:*:*:*:*
    • cpe:2.3:a:bestpractical:request_tracker:4.2.13:*:*:*:*:*:*:*
    • cpe:2.3:a:bestpractical:request_tracker:4.2.2:*:*:*:*:*:*:*
    • cpe:2.3:a:bestpractical:request_tracker:4.2.3:*:*:*:*:*:*:*
    • cpe:2.3:a:bestpractical:request_tracker:4.2.4:*:*:*:*:*:*:*
    • cpe:2.3:a:bestpractical:request_tracker:4.2.5:*:*:*:*:*:*:*
    • cpe:2.3:a:bestpractical:request_tracker:4.2.6:*:*:*:*:*:*:*
    • cpe:2.3:a:bestpractical:request_tracker:4.2.7:*:*:*:*:*:*:*
    • cpe:2.3:a:bestpractical:request_tracker:4.2.8:*:*:*:*:*:*:*
    • cpe:2.3:a:bestpractical:request_tracker:4.2.9:*:*:*:*:*:*:*
    • cpe:2.3:a:bestpractical:request_tracker:4.4.0:*:*:*:*:*:*:*
    • cpe:2.3:a:bestpractical:request_tracker:4.4.1:*:*:*:*:*:*:*

Patches

0

No patches discovered yet.

Vulnerability mechanics

AI mechanics synthesis has not run for this CVE yet.

References

3

News mentions

0

No linked articles in our index yet.