{"id":"CVE-2011-2082","details":"The vulnerable-passwords script in Best Practical Solutions RT 3.x before 3.8.12 and 4.x before 4.0.6 does not update the password-hash algorithm for disabled user accounts, which makes it easier for context-dependent attackers to determine cleartext passwords, and possibly use these passwords after accounts are re-enabled, via a brute-force attack on the database.  NOTE: this vulnerability exists because of an incomplete fix for CVE-2011-0009.","modified":"2026-04-10T03:41:49.687387Z","published":"2012-06-04T19:55:01Z","references":[{"type":"ADVISORY","url":"http://secunia.com/advisories/49259"},{"type":"FIX","url":"http://lists.bestpractical.com/pipermail/rt-announce/2012-May/000203.html"},{"type":"FIX","url":"http://lists.bestpractical.com/pipermail/rt-announce/2012-May/000204.html"},{"type":"WEB","url":"http://lists.bestpractical.com/pipermail/rt-announce/2012-May/000202.html"},{"type":"WEB","url":"http://www.securityfocus.com/bid/53660"}],"schema_version":"1.7.5"}