Project

General

Profile

Security Advisories » History » Version 49

Marius BĂLTEANU, 2021-04-26 22:14
Add new vulnerabilities

1 1 Jean-Philippe Lang
h1. Redmine Security Advisories
2
3 2 Jean-Philippe Lang
This page lists the security vulnerabilities that were fixed in Redmine releases, starting from 1.3.0. If you think that you've found a security vulnerability, please report it by sending an email to: @security(at)redmine.org@.
4 1 Jean-Philippe Lang
5 35 Jan from Planio www.plan.io
To detect if your own Redmine is subject to any of these vulnerabilties, you can use Planio's "Redmine Security Scanner":https://plan.io/redmine-security-scanner/.
6
7 21 Jan from Planio www.plan.io
|_. Severity|_. Details|_.External references|_. Affected versions|_. Fixed versions|
8 49 Marius BĂLTEANU
|{background-color:#ffc}. Low|Mail handler bypasses add_issue_notes permission (#35045)||All prior releases since version:3.3.0|version:4.2.1, version:4.1.3 and version:4.0.9|
9
|{background-color:#ff8}. Moderate|Allowed filename extensions of attachments can be circumvented (#34367)||All prior releases|version:4.2.1, version:4.1.3 and version:4.0.9|
10
|{background-color:#f88}. Critical|Arbitrary file read in Git adapter (#35085)||All prior releases|version:4.2.1, version:4.1.3 and version:"4.0.9"|
11
|{background-color:#ff8}. Moderate|SysController and MailHandlerController are vulnerable to timing attack (#34950)||All prior releases to version:4.2.0|version:4.2.0, version:4.1.3 and version:"4.0.9"|
12 48 Holger Just
|{background-color:#fb8}. High|Inline issue auto complete doesn't sanitize HTML tags (#33846)|"CVE-2021-29274":https://nvd.nist.gov/vuln/detail/CVE-2021-29274|version:4.1.0 and version:4.1.1 |version:4.1.2 and version:4.0.8|
13 46 Marius BĂLTEANU
|{background-color:#ff8}. Moderate|Names of private projects are leaked by issue journal details that contain project_id changes(#33360)||All prior releases|version:4.1.2 and version:4.0.8|
14
|{background-color:#fb8}. High|Issues API bypasses add_issue_notes permission (#33689)||All prior releases|version:4.1.2 and version:4.0.8|
15
|{background-color:#fb8}. High |Ruby on Rails vulnerabilities ("rails 5.2.4.3":https://weblog.rubyonrails.org/2020/5/18/Rails-5-2-4-3-and-6-0-3-1-have-been-released/, "rails 5.2.4.5":https://weblog.rubyonrails.org/2021/2/10/Rails-5-2-4-5-6-0-3-5-and-6-1-2-1-have-been-released/)|"CVE-2020-8162":https://nvd.nist.gov/vuln/detail/CVE-2020-8162, "CVE-2020-8164":https://nvd.nist.gov/vuln/detail/CVE-2020-8164, "CVE-2020-8165":https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-8165, "CVE-2020-8166":https://nvd.nist.gov/vuln/detail/CVE-2020-8166, "CVE-2020-8167":https://nvd.nist.gov/vuln/detail/CVE-2020-8167, "CVE-2021-22880":https://nvd.nist.gov/vuln/detail/CVE-2021-22880, "CVE-2021-22881":https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22881|All prior releases|version:4.1.2 and version:4.0.8|
16 44 Jean-Philippe Lang
|{background-color:#ff8}. Moderate|XSS vulnerability due to missing back_url validation (#32850)||All prior releases|version:4.1.1 and version:4.0.7|
17 45 Jean-Philippe Lang
|{background-color:#fb8}. High|Persistent XSS vulnerabilities in textile inline links (#32934)||All prior releases|version:4.1.1 and version:4.0.7|
18 44 Jean-Philippe Lang
|{background-color:#ff8}. Moderate|Time entries CSV export may disclose subjects of issues that are not visible||All prior releases|version:4.1.1 and version:4.0.7|
19 43 Jean-Philippe Lang
|{background-color:#ff8}. Moderate|Improper markup sanitization in Textile formatting (#25742)||All prior releases|version:4.0.6 and version:3.4.13|
20 42 Jean-Philippe Lang
|{background-color:#f88}. Critical|SQL injection|"CVE-2019-18890":https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-18890|Redmine <= 3.3.9|version:3.3.10|
21 41 Holger Just
|{background-color:#fb8}. High|Persistent XSS in textile formatting|"CVE-2019-17427":https://nvd.nist.gov/vuln/detail/CVE-2019-17427|All prior releases|version:3.4.11 and version:4.0.4|
22 39 Jean-Philippe Lang
|{background-color:#f88}. Critical|Ruby on Rails vulnerabilities ("announcement":https://weblog.rubyonrails.org/2019/3/13/Rails-4-2-5-1-5-1-6-2-have-been-released/)|"CVE-2019-5418":https://github.com/mpgn/CVE-2019-5418, "CVE-2019-5419":https://nvd.nist.gov/vuln/detail/CVE-2019-5419, "CVE-2019-5420":https://nvd.nist.gov/vuln/detail/CVE-2019-5420|All prior releases|version:3.4.10 and version:4.0.3|
23 38 Go MAEDA
|{background-color:#fb8}. High|Remote command execution through mercurial adapter|"CVE-2017-18026":https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18026|All prior releases|version:3.2.9, version:3.3.6 and version:3.4.4|
24 37 Jean-Philippe Lang
|{background-color:#fb8}. High|Multiple XSS vulnerabilities (#27186)|"CVE-2017-15568":https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15568, "CVE-2017-15569":https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15569, "CVE-2017-15570":https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15570, "CVE-2017-15571":https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15571|All prior releases|version:3.2.8, version:3.3.5 and version:3.4.3|
25 34 Mischa The Evil
|{background-color:#ffc}. Low|Email reminders reveal information about inaccessible issues (#25713)|"CVE-2017-16804":https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16804|All prior releases|version:3.2.7, version:3.3.4 and version:3.4.0|
26 32 Mischa The Evil
|{background-color:#ff8}. Moderate|Improper markup sanitization in wiki content (#25503)|"CVE-2017-15573":https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15573|All prior releases|version:3.2.6 and version:3.3.3|
27
|{background-color:#ff8}. Moderate|Use redirect on /account/lost_password to prevent password reset tokens in referers (#24416)|"CVE-2017-15572":https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15572|All prior releases|version:3.2.6 and version:3.3.3|
28
|{background-color:#ff8}. Moderate|Redmine.pm doesn't check that the repository module is enabled on project (#24307)|"CVE-2017-15575":https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15575|All prior releases|version:3.2.6 and version:3.3.3|
29
|{background-color:#fb8}. High|Stored XSS with SVG attachments (#24199)|"CVE-2017-15574":https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15574|All prior releases|version:3.2.6 and version:3.3.3|
30
|{background-color:#ff8}. Moderate|Information leak when rendering Time Entry on activity view (#23803)|"CVE-2017-15576":https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15576|All prior releases|version:3.2.6 and version:3.3.3|
31
|{background-color:#ff8}. Moderate|Information leak when rendering Wiki links (#23793)|"CVE-2017-15577":https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15577|All prior releases|version:3.2.6 and version:3.3.3|
32
|{background-color:#fb8}. High|Persistent XSS vulnerabilities in text formatting (Textile and Markdown) and project homepage|"CVE-2016-10515":https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10515|All prior releases|version:3.2.3|
33 26 Jean-Philippe Lang
|{background-color:#f88}. Critical|ImageMagick vulnerabilities|"CVE-2016-3714":https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3714|All prior releases since 2.1.0|version:3.1.5 and version:3.2.2|
34 25 Jan from Planio www.plan.io
|{background-color:#ff8}. Moderate|Data disclosure in atom feed|"CVE-2015-8537":https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8537|All prior releases|version:2.6.9, version:3.0.7 and version:3.1.3|
35 23 Jan from Planio www.plan.io
|{background-color:#ff8}. Moderate|Potential changeset message disclosure in issues API|"CVE-2015-8473":https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8473|All prior releases|version:2.6.8, version:3.0.6 and version:3.1.2|
36 24 Jan from Planio www.plan.io
|{background-color:#ff8}. Moderate|Data disclosure on the time logging form|"CVE-2015-8346":https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8346|All prior releases|version:2.6.8, version:3.0.6 and version:3.1.2|
37 22 Jan from Planio www.plan.io
|{background-color:#ff8}. Moderate|Open Redirect vulnerability|"CVE-2015-8474":https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8474|2.5.1 to 2.6.6, 3.0.0 to 3.0.4 and 3.1.0|version:2.6.7, version:3.0.5 and version:3.1.1|
38
|{background-color:#ffc}. Low|Potential XSS vulnerability when rendering some flash messages|"CVE-2015-8477":https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8477|All prior releases|version:2.6.2 and version:3.0.0|
39 21 Jan from Planio www.plan.io
|{background-color:#ff8}. Moderate|Potential data leak (project names) in the invalid form authenticity token error screen||All prior releases|version:2.4.6 and version:2.5.2|
40
|{background-color:#ff8}. Moderate|Open Redirect vulnerability|"JVN#93004610":https://jvn.jp/en/jp/JVN93004610/index.html, "CVE-2014-1985":http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2014-1985|All prior releases|version:2.4.5 and version:2.5.1|
41
|{background-color:#f88}. Critical|Ruby on Rails vulnerability ("announcement":http://weblog.rubyonrails.org/2013/3/18/SEC-ANN-Rails-3-2-13-3-1-12-and-2-3-18-have-been-released/)||All releases prior to 2.2.4|version:2.2.4, version:2.3.0|
42
|{background-color:#f88}. Critical|Ruby on Rails vulnerability ("announcement":http://weblog.rubyonrails.org/2013/2/11/SEC-ANN-Rails-3-2-12-3-1-11-and-2-3-17-have-been-released/)||All releases prior to 2.2.3|version:2.2.3|
43
|{background-color:#f88}. Critical|Ruby on Rails vulnerability ("announcement":https://groups.google.com/forum/?fromgroups=#!topic/rubyonrails-security/1h2DR63ViGo)||All releases prior to 2.2.1 and 2.1.6|"Fix for 1.4.7":/news/78|
44
|{background-color:#f88}. Critical|Ruby on Rails vulnerability ("announcement":https://groups.google.com/forum/#!msg/rubyonrails-security/c7jT-EeN9eI/L0u4e87zYGMJ)||All releases prior to 2.2.1 and 2.1.6|version:1.4.7|
45
|{background-color:#f88}. Critical|Ruby on Rails vulnerability ("announcement":http://weblog.rubyonrails.org/2013/1/8/Rails-3-2-11-3-1-10-3-0-19-and-2-3-15-have-been-released/)||All prior releases| version:2.2.1, version:2.1.6, version:1.4.6|
46
|{background-color:#ff8}. Moderate|XSS vulnerability||2.1.0 and 2.1.1|version:2.1.2|
47
|{background-color:#fb8}. High|Persistent XSS vulnerability|"JVN#93406632":http://jvn.jp/en/jp/JVN93406632/, "CVE-2012-0327":http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2012-0327|All prior releases|version:1.3.2|
48
|{background-color:#ff8}. Moderate|Mass-assignemnt vulnerability that would allow an attacker to bypass part of the security checks||All prior releases|version:1.3.2|
49
|{background-color:#fb8}. High|Vulnerability that would allow an attacker to bypass the CSRF protection||All prior releases|version:1.3.0|