{"id":"UBUNTU-CVE-2013-3374","details":"Unspecified vulnerability in Request Tracker (RT) 3.8.x before 3.8.17 and 4.0.x before 4.0.13, when using the Apache::Session::File session store, allows remote attackers to obtain sensitive information (user preferences and caches) via unknown vectors, related to a \"limited session re-use.\"","modified":"2025-07-16T07:47:31.666464Z","published":"2013-08-23T16:55:00Z","withdrawn":"2025-07-18T16:42:54Z","upstream":["CVE-2013-3374"],"references":[{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2013-3374"},{"type":"REPORT","url":"http://lists.bestpractical.com/pipermail/rt-announce/2013-May/000226.html"},{"type":"REPORT","url":"https://www.cve.org/CVERecord?id=CVE-2013-3374"}],"affected":[{"package":{"name":"request-tracker4","ecosystem":"Ubuntu:14.04:LTS","purl":"pkg:deb/ubuntu/request-tracker4@4.0.19-1?arch=source&distro=trusty"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"4.0.19-1"}]}],"versions":["4.0.13-1","4.0.18-1","4.0.18-1ubuntu1"],"ecosystem_specific":{"availability":"No subscription required","binaries":[{"binary_name":"request-tracker4","binary_version":"4.0.19-1"},{"binary_name":"rt4-apache2","binary_version":"4.0.19-1"},{"binary_name":"rt4-clients","binary_version":"4.0.19-1"},{"binary_name":"rt4-db-mysql","binary_version":"4.0.19-1"},{"binary_name":"rt4-db-postgresql","binary_version":"4.0.19-1"},{"binary_name":"rt4-db-sqlite","binary_version":"4.0.19-1"},{"binary_name":"rt4-doc-html","binary_version":"4.0.19-1"},{"binary_name":"rt4-fcgi","binary_version":"4.0.19-1"}]},"database_specific":{"source":"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/cve/2013/UBUNTU-CVE-2013-3374.json"}}],"schema_version":"1.7.3","severity":[{"type":"Ubuntu","score":"medium"}]}