Vulnerability Details : CVE-2009-4405
Multiple unspecified vulnerabilities in Trac before 0.11.6 have unknown impact and attack vectors, possibly related to (1) "policy checks in report results when using alternate formats" or (2) a "check for the 'raw' role that is missing in docutils < 0.6."
Products affected by CVE-2009-4405
- cpe:2.3:a:edgewall:trac:*:*:*:*:*:*:*:*
- cpe:2.3:a:edgewall:trac:0.11.5:rc2:*:*:*:*:*:*
- cpe:2.3:a:edgewall:trac:0.11.5:rc1:*:*:*:*:*:*
- cpe:2.3:a:edgewall:trac:0.11:*:*:*:*:*:*:*
- cpe:2.3:a:edgewall:trac:0.11:rc2:*:*:*:*:*:*
- cpe:2.3:a:edgewall:trac:0.10.3:*:*:*:*:*:*:*
- cpe:2.3:a:edgewall:trac:0.10.3:rc1:*:*:*:*:*:*
- cpe:2.3:a:edgewall:trac:0.9.5:*:*:*:*:*:*:*
- cpe:2.3:a:edgewall:trac:0.9.4:*:*:*:*:*:*:*
- cpe:2.3:a:edgewall:trac:0.8.1:*:*:*:*:*:*:*
- cpe:2.3:a:edgewall:trac:0.8:*:*:*:*:*:*:*
- cpe:2.3:a:edgewall:trac:0.5.1:*:*:*:*:*:*:*
- cpe:2.3:a:edgewall:trac:0.5:*:*:*:*:*:*:*
- cpe:2.3:a:edgewall:trac:0.11.2:*:*:*:*:*:*:*
- cpe:2.3:a:edgewall:trac:0.11.1:*:*:*:*:*:*:*
- cpe:2.3:a:edgewall:trac:0.10.4:*:*:*:*:*:*:*
- cpe:2.3:a:edgewall:trac:0.10.3.1:*:*:*:*:*:*:*
- cpe:2.3:a:edgewall:trac:0.10:beta1:*:*:*:*:*:*
- cpe:2.3:a:edgewall:trac:0.9.6:*:*:*:*:*:*:*
- cpe:2.3:a:edgewall:trac:0.8.3:*:*:*:*:*:*:*
- cpe:2.3:a:edgewall:trac:0.8.2:*:*:*:*:*:*:*
- cpe:2.3:a:edgewall:trac:0.50.9:*:*:*:*:*:*:*
- cpe:2.3:a:edgewall:trac:0.5.2:*:*:*:*:*:*:*
- cpe:2.3:a:edgewall:trac:0.11.4:rc2:*:*:*:*:*:*
- cpe:2.3:a:edgewall:trac:0.11.3:*:*:*:*:*:*:*
- cpe:2.3:a:edgewall:trac:0.11.2.1:*:*:*:*:*:*:*
- cpe:2.3:a:edgewall:trac:0.11:b1:*:*:*:*:*:*
- cpe:2.3:a:edgewall:trac:0.10.5:*:*:*:*:*:*:*
- cpe:2.3:a:edgewall:trac:0.10:*:*:*:*:*:*:*
- cpe:2.3:a:edgewall:trac:0.10:rc1:*:*:*:*:*:*
- cpe:2.3:a:edgewall:trac:0.9:*:*:*:*:*:*:*
- cpe:2.3:a:edgewall:trac:0.8.4:*:*:*:*:*:*:*
- cpe:2.3:a:edgewall:trac:0.6.1:*:*:*:*:*:*:*
- cpe:2.3:a:edgewall:trac:0.6:*:*:*:*:*:*:*
- cpe:2.3:a:edgewall:trac:0.11.4:*:*:*:*:*:*:*
- cpe:2.3:a:edgewall:trac:0.11.4:rc1:*:*:*:*:*:*
- cpe:2.3:a:edgewall:trac:0.11:rc1:*:*:*:*:*:*
- cpe:2.3:a:edgewall:trac:0.11:b2:*:*:*:*:*:*
- cpe:2.3:a:edgewall:trac:0.10.2:*:*:*:*:*:*:*
- cpe:2.3:a:edgewall:trac:0.10.1:*:*:*:*:*:*:*
- cpe:2.3:a:edgewall:trac:0.9.3:*:*:*:*:*:*:*
- cpe:2.3:a:edgewall:trac:0.9.2:*:*:*:*:*:*:*
- cpe:2.3:a:edgewall:trac:0.9.1:*:*:*:*:*:*:*
- cpe:2.3:a:edgewall:trac:0.7.1:*:*:*:*:*:*:*
- cpe:2.3:a:edgewall:trac:0.7:*:*:*:*:*:*:*
Exploit prediction scoring system (EPSS) score for CVE-2009-4405
0.58%
Probability of exploitation activity in the next 30 days
EPSS Score History
~ 78 %
Percentile, the proportion of vulnerabilities that are scored at or less
CVSS scores for CVE-2009-4405
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source | First Seen |
---|---|---|---|---|---|---|
7.5
|
HIGH | AV:N/AC:L/Au:N/C:P/I:P/A:P |
10.0
|
6.4
|
NIST |
References for CVE-2009-4405
-
https://exchange.xforce.ibmcloud.com/vulnerabilities/54983
Trac alternate format security bypass CVE-2009-4405 Vulnerability Report
-
https://bugzilla.redhat.com/show_bug.cgi?id=542394
542394 – (CVE-2009-4405) trac: please update to the latest stable version (0.11.4 -> 0.11.6)
-
http://www.vupen.com/english/advisories/2009/3615
Webmail: access your OVH emails on ovhcloud.com | OVHcloudVendor Advisory
-
http://trac.edgewall.org/browser/tags/trac-0.11.6/RELEASE
RELEASE in tags/trac-0.11.6 – The Trac Project
-
https://www.redhat.com/archives/fedora-package-announce/2009-December/msg01169.html
[SECURITY] Fedora 12 Update: trac-0.11.6-1.fc12
Jump to