CVE-2023-45024

7.5 HIGH

📋 TL;DR

This vulnerability in Best Practical Request Tracker (RT) allows attackers to access sensitive information through the transaction search feature in the transaction query builder. It affects RT 5 installations before version 5.0.5. The information disclosure could expose internal transaction data that should be restricted.

💻 Affected Systems

Products:
  • Best Practical Request Tracker (RT)
Versions: RT 5.x versions before 5.0.5
Operating Systems: All operating systems running RT
Default Config Vulnerable: ⚠️ Yes
Notes: All RT 5 installations before 5.0.5 are vulnerable regardless of configuration.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete exposure of all transaction data including sensitive internal communications, ticket details, and potentially confidential information stored in RT.

🟠

Likely Case

Unauthorized access to transaction records containing sensitive operational data, user information, and internal communications.

🟢

If Mitigated

Limited exposure of non-critical transaction metadata if proper access controls and monitoring are in place.

🌐 Internet-Facing: HIGH - If RT is exposed to the internet, attackers can directly exploit this vulnerability without network access.
🏢 Internal Only: MEDIUM - Internal attackers or compromised accounts could exploit this to gather sensitive information.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires access to the transaction search interface, which typically requires authentication.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 5.0.5

Vendor Advisory: https://docs.bestpractical.com/release-notes/rt/5.0.5

Restart Required: Yes

Instructions:

1. Backup your RT installation and database. 2. Download RT 5.0.5 from Best Practical. 3. Follow the upgrade instructions at https://docs.bestpractical.com/rt/5.0.5/upgrade/. 4. Restart RT services.

🔧 Temporary Workarounds

Disable transaction search

all

Temporarily disable the transaction search functionality in RT to prevent exploitation.

# Modify RT configuration to remove transaction search access
# Edit RT_SiteConfig.pm to restrict transaction query builder access

Restrict access controls

all

Tighten access controls to limit who can use transaction search features.

# Configure RT ACLs to restrict 'ShowTransaction' and 'ShowTicket' rights
# Use RT's group-based permissions to limit access

🧯 If You Can't Patch

  • Implement strict network segmentation to isolate RT from untrusted networks
  • Enhance monitoring of transaction search activities and set up alerts for unusual patterns

🔍 How to Verify

Check if Vulnerable:

Check RT version by running: rt-server --version or check the RT web interface footer. If version is 5.x and less than 5.0.5, you are vulnerable.

Check Version:

rt-server --version

Verify Fix Applied:

After upgrading, verify version is 5.0.5 or higher using the same commands. Test transaction search functionality to ensure it works without exposing unauthorized data.

📡 Detection & Monitoring

Log Indicators:

  • Unusual transaction search patterns
  • Multiple failed transaction queries from single users
  • Transaction queries returning large datasets

Network Indicators:

  • Increased traffic to transaction search endpoints
  • Patterns of sequential transaction ID queries

SIEM Query:

source="rt.log" AND ("transaction search" OR "transaction query") AND (status=200 OR bytes_transferred>100000)

🔗 References

📤 Share & Export