Security Advisories » History » Version 29
Mischa The Evil, 2017-07-02 10:10
#25615: 3.1.6 didn't include the security fixes due to a merge error.
1 | 1 | Jean-Philippe Lang | h1. Redmine Security Advisories |
---|---|---|---|
2 | |||
3 | 2 | Jean-Philippe Lang | This page lists the security vulnerabilities that were fixed in Redmine releases, starting from 1.3.0. If you think that you've found a security vulnerability, please report it by sending an email to: @security(at)redmine.org@. |
4 | 1 | Jean-Philippe Lang | |
5 | 21 | Jan from Planio www.plan.io | |_. Severity|_. Details|_.External references|_. Affected versions|_. Fixed versions| |
6 | 28 | Jean-Philippe Lang | |{background-color:#ff8}. Moderate|Improper markup sanitization in wiki content (#25503)||All prior releases|version:3.2.6 and version:3.3.3| |
7 | |{background-color:#ff8}. Moderate|Use redirect on /account/lost_password to prevent password reset tokens in referers (#24416)||All prior releases|version:3.2.6 and version:3.3.3| |
||
8 | |{background-color:#ff8}. Moderate|Redmine.pm doesn't check that the repository module is enabled on project (#24307)||All prior releases|version:3.2.6 and version:3.3.3| |
||
9 | |{background-color:#fb8}. High|Stored XSS with SVG attachments (#24199)||All prior releases|version:3.2.6 and version:3.3.3| |
||
10 | |{background-color:#ff8}. Moderate|Information leak when rendering Time Entry on activity view (#23803)||All prior releases|version:3.2.6 and version:3.3.3| |
||
11 | |{background-color:#ff8}. Moderate|Information leak when rendering Wiki links (#23793)||All prior releases|version:3.2.6 and version:3.3.3| |
||
12 | 29 | Mischa The Evil | |{background-color:#fb8}. High|Persistent XSS vulnerabilities in text formatting (Textile and Markdown) and project homepage||All prior releases|version:3.2.3| |
13 | 26 | Jean-Philippe Lang | |{background-color:#f88}. Critical|ImageMagick vulnerabilities|"CVE-2016-3714":https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3714|All prior releases since 2.1.0|version:3.1.5 and version:3.2.2| |
14 | 25 | Jan from Planio www.plan.io | |{background-color:#ff8}. Moderate|Data disclosure in atom feed|"CVE-2015-8537":https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8537|All prior releases|version:2.6.9, version:3.0.7 and version:3.1.3| |
15 | 23 | Jan from Planio www.plan.io | |{background-color:#ff8}. Moderate|Potential changeset message disclosure in issues API|"CVE-2015-8473":https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8473|All prior releases|version:2.6.8, version:3.0.6 and version:3.1.2| |
16 | 24 | Jan from Planio www.plan.io | |{background-color:#ff8}. Moderate|Data disclosure on the time logging form|"CVE-2015-8346":https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8346|All prior releases|version:2.6.8, version:3.0.6 and version:3.1.2| |
17 | 22 | Jan from Planio www.plan.io | |{background-color:#ff8}. Moderate|Open Redirect vulnerability|"CVE-2015-8474":https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8474|2.5.1 to 2.6.6, 3.0.0 to 3.0.4 and 3.1.0|version:2.6.7, version:3.0.5 and version:3.1.1| |
18 | |{background-color:#ffc}. Low|Potential XSS vulnerability when rendering some flash messages|"CVE-2015-8477":https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8477|All prior releases|version:2.6.2 and version:3.0.0| |
||
19 | 21 | Jan from Planio www.plan.io | |{background-color:#ff8}. Moderate|Potential data leak (project names) in the invalid form authenticity token error screen||All prior releases|version:2.4.6 and version:2.5.2| |
20 | |{background-color:#ff8}. Moderate|Open Redirect vulnerability|"JVN#93004610":https://jvn.jp/en/jp/JVN93004610/index.html, "CVE-2014-1985":http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2014-1985|All prior releases|version:2.4.5 and version:2.5.1| |
||
21 | |{background-color:#f88}. Critical|Ruby on Rails vulnerability ("announcement":http://weblog.rubyonrails.org/2013/3/18/SEC-ANN-Rails-3-2-13-3-1-12-and-2-3-18-have-been-released/)||All releases prior to 2.2.4|version:2.2.4, version:2.3.0| |
||
22 | |{background-color:#f88}. Critical|Ruby on Rails vulnerability ("announcement":http://weblog.rubyonrails.org/2013/2/11/SEC-ANN-Rails-3-2-12-3-1-11-and-2-3-17-have-been-released/)||All releases prior to 2.2.3|version:2.2.3| |
||
23 | |{background-color:#f88}. Critical|Ruby on Rails vulnerability ("announcement":https://groups.google.com/forum/?fromgroups=#!topic/rubyonrails-security/1h2DR63ViGo)||All releases prior to 2.2.1 and 2.1.6|"Fix for 1.4.7":/news/78| |
||
24 | |{background-color:#f88}. Critical|Ruby on Rails vulnerability ("announcement":https://groups.google.com/forum/#!msg/rubyonrails-security/c7jT-EeN9eI/L0u4e87zYGMJ)||All releases prior to 2.2.1 and 2.1.6|version:1.4.7| |
||
25 | |{background-color:#f88}. Critical|Ruby on Rails vulnerability ("announcement":http://weblog.rubyonrails.org/2013/1/8/Rails-3-2-11-3-1-10-3-0-19-and-2-3-15-have-been-released/)||All prior releases| version:2.2.1, version:2.1.6, version:1.4.6| |
||
26 | |{background-color:#ff8}. Moderate|XSS vulnerability||2.1.0 and 2.1.1|version:2.1.2| |
||
27 | |{background-color:#fb8}. High|Persistent XSS vulnerability|"JVN#93406632":http://jvn.jp/en/jp/JVN93406632/, "CVE-2012-0327":http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2012-0327|All prior releases|version:1.3.2| |
||
28 | |{background-color:#ff8}. Moderate|Mass-assignemnt vulnerability that would allow an attacker to bypass part of the security checks||All prior releases|version:1.3.2| |
||
29 | |{background-color:#fb8}. High|Vulnerability that would allow an attacker to bypass the CSRF protection||All prior releases|version:1.3.0| |