Project

General

Profile

Security Advisories » History » Revision 4

Revision 3 (Jean-Philippe Lang, 2012-03-13 11:42) → Revision 4/79 (Jean-Philippe Lang, 2012-03-13 11:55)

h1. Redmine Security Advisories 

 This page lists the security vulnerabilities that were fixed in Redmine releases, starting from 1.3.0. If you think that you've found a security vulnerability, please report it by sending an email to: @security(at)redmine.org@. 

 |_. Severity|_. Details|_. Affected versions| 
 |\3{padding:1em}. Fixed *Fixed in Redmine version:1.3.2| 
 |{background-color:#fb8}. High|Persistent 1.3.2* 

 * %{background-color:#fb8}High%: persistent XSS vulnerability ("JVN#93406632":http://jvn.jp/en/jp/JVN93406632/)|All prior releases| (affected version: all previous releases) ("JVN#93406632":http://jvn.jp/en/jp/JVN93406632/) 
 |{background-color:#ff8}. Moderate|Mass-assignemnt * %{background-color:#ff8}Moderate%: mass-assignemnt vulnerability that would allow an attacker to bypass part of the security checks|All prior releases| 
 |\3{padding:1em}. Fixed checks (affected version: all previous releases) 

 *Fixed in Redmine version:1.3.0| 
 |{background-color:#fb8}. High|Vulnerability 1.3.0* 

 * %{background-color:#fb8}High%: vulnerability that would allow an attacker to bypass the CSRF protection|All prior releases| protection (affected version: all previous releases)