Request Tracker (RT) is prone to multiple security vulnerabilities including a spoofing vulnerability, Multiple security-bypass vulnerabilities, a cross-site request-forgery vulnerability and a command-injection vulnerability.
Credit:
The information has been provided by Scott MacVicar.
Vulnerable Systems:
* Request Tracker 3.8.15 and prior
Attackers may exploit these issues to perform certain administrative actions, add arbitrary email headers, execute arbitrary commands, bypass certain security restrictions, gain unauthorized access to the affected application, or delete certain data. Other attacks are also possible.