Security Advisories » History » Version 6
Jean-Philippe Lang, 2012-09-30 12:53
1 | 1 | Jean-Philippe Lang | h1. Redmine Security Advisories |
---|---|---|---|
2 | |||
3 | 2 | Jean-Philippe Lang | This page lists the security vulnerabilities that were fixed in Redmine releases, starting from 1.3.0. If you think that you've found a security vulnerability, please report it by sending an email to: @security(at)redmine.org@. |
4 | 1 | Jean-Philippe Lang | |
5 | 4 | Jean-Philippe Lang | |_. Severity|_. Details|_. Affected versions| |
6 | 6 | Jean-Philippe Lang | |\3{padding:1em}. Fixed in Redmine version:2.1.2| |
7 | |{background-color:#ff8}. Moderate|XSS vulnerability|2.1.0 and 2.1.1| |
||
8 | 4 | Jean-Philippe Lang | |\3{padding:1em}. Fixed in Redmine version:1.3.2| |
9 | 5 | Jean-Philippe Lang | |{background-color:#fb8}. High|Persistent XSS vulnerability (referenced as "JVN#93406632":http://jvn.jp/en/jp/JVN93406632/, "CVE-2012-0327":http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2012-0327)|All prior releases| |
10 | 4 | Jean-Philippe Lang | |{background-color:#ff8}. Moderate|Mass-assignemnt vulnerability that would allow an attacker to bypass part of the security checks|All prior releases| |
11 | |\3{padding:1em}. Fixed in Redmine version:1.3.0| |
||
12 | |{background-color:#fb8}. High|Vulnerability that would allow an attacker to bypass the CSRF protection|All prior releases| |