Name | CVE-2025-30087 |
Description | Cross Site Scripting via injection of malicious parameters in a search URL |
Source | CVE (at NVD; CERT, LWN, oss-sec, fulldisc, Red Hat, Ubuntu, Gentoo, SUSE bugzilla/CVE, GitHub advisories/code/issues, web search, more) |
Debian Bugs | 1104422, 1104424 |
Vulnerable and fixed packages
The table below lists information on source packages.
Source Package | Release | Version | Status |
---|
request-tracker4 (PTS) | bullseye (security), bullseye | 4.4.4+dfsg-2+deb11u3 | vulnerable |
| bookworm, bookworm (security) | 4.4.6+dfsg-1.1+deb12u1 | vulnerable |
| sid | 4.4.7+dfsg-4 | vulnerable |
request-tracker5 (PTS) | bookworm, bookworm (security) | 5.0.3+dfsg-3~deb12u2 | vulnerable |
| sid, trixie | 5.0.7+dfsg-2 | vulnerable |
The information below is based on the following data on fixed versions.
Notes
Fixed by: https://github.com/bestpractical/rt/commit/ac9af1b7fe8dc6af9b6b4627b92fd316d563e0ab (rt-4.4.8)
Fixed by: https://github.com/bestpractical/rt/commit/3342dd4caf290b1c4d5ab60cd908821cfdb7fa8b (rt-4.4.8)
Fixed by: https://github.com/bestpractical/rt/commit/e144e90f6a5ad2accad2dde1fef17187939b7110 (rt-4.4.8)
Fixed by: https://github.com/bestpractical/rt/commit/367359e56a599b72c8e38e177eaba9d32e9a5471 (rt-5.0.8)
Fixed by: https://github.com/bestpractical/rt/commit/e24ca3b0a63ce9c2b5d4e01cc419af5056deb346 (rt-5.0.8)