Actions
Security Advisories » History » Revision 16
« Previous |
Revision 16/79
(diff)
| Next »
Jean-Philippe Lang, 2015-02-19 20:26
Redmine Security Advisories¶
This page lists the security vulnerabilities that were fixed in Redmine releases, starting from 1.3.0. If you think that you've found a security vulnerability, please report it by sending an email to: security(at)redmine.org
.
Severity | Details | Affected versions | Fixed versions |
---|---|---|---|
Low | Potential XSS vulnerability when rendering some flash messages | All prior releases | 2.6.2 and 3.0.0 |
Moderate | Potential data leak (project names) in the invalid form authenticity token error screen | All prior releases | 2.4.6 and 2.5.2 |
Moderate | Open Redirect vulnerability (referenced as JVN#93004610) | All prior releases | 2.4.5 and 2.5.1 |
Critical | Ruby on Rails vulnerability (announcement) | All releases prior to 2.2.4 | 2.2.4, 2.3.0 |
Critical | Ruby on Rails vulnerability (announcement) | All releases prior to 2.2.3 | 2.2.3 |
Critical | Ruby on Rails vulnerability (announcement) | All releases prior to 2.2.1 and 2.1.6 | Fix for 1.4.7 |
Critical | Ruby on Rails vulnerability (announcement) | All releases prior to 2.2.1 and 2.1.6 | 1.4.7 |
Critical | Ruby on Rails vulnerability (announcement) | All prior releases | 2.2.1, 2.1.6, 1.4.6 |
Moderate | XSS vulnerability | 2.1.0 and 2.1.1 | 2.1.2 |
High | Persistent XSS vulnerability (referenced as JVN#93406632, CVE-2012-0327) | All prior releases | 1.3.2 |
Moderate | Mass-assignemnt vulnerability that would allow an attacker to bypass part of the security checks | All prior releases | 1.3.2 |
High | Vulnerability that would allow an attacker to bypass the CSRF protection | All prior releases | 1.3.0 |
Updated by Jean-Philippe Lang almost 10 years ago · 16 revisions locked