Security Advisories » History » Version 81
Holger Just, 2025-04-01 15:23
Add Credits column to credit researchers for their findings, Add a few issue references
1 | 1 | Jean-Philippe Lang | h1. Redmine Security Advisories |
---|---|---|---|
2 | |||
3 | 2 | Jean-Philippe Lang | This page lists the security vulnerabilities that were fixed in Redmine releases, starting from 1.3.0. If you think that you've found a security vulnerability, please report it by sending an email to: @security(at)redmine.org@. |
4 | 1 | Jean-Philippe Lang | |
5 | 77 | Holger Just | To detect if your own Redmine is subject to any of these vulnerabilities, you can use Planio's "Redmine Security Scanner":https://plan.io/redmine-security-scanner/. |
6 | 35 | Jan from Planio www.plan.io | |
7 | 81 | Holger Just | |_. Severity|_. Details|_.External references|_.Credits|_. Affected versions|_. Fixed versions| |
8 | |{background-color:#fb8}. High| ProjectQuery leaks details of private projects (#42352) ||XBOW Security Team|All prior releases since version:5.1.0|version:6.0.4 and version:5.1.7| |
||
9 | |{background-color:#fb8}. High| XSS in custom query (#42238) ||Hau Van (@hauvcp)|version:6.0.0 - version:6.0.3|version:6.0.4| |
||
10 | |{background-color:#fb8}. High| XSS in macros (#42326) ||Elweth|All prior releases since version:5.1.0|version:6.0.4 and version:5.1.7| |
||
11 | |{background-color:#ff8}. Moderate| /my/account does not correctly enforce sudo mode (#42194)||Jens Krämer of Planio (@jkraemer)|All prior releases since version:"4.1.0"|version:6.0.4, version:5.1.7 and version:5.0.12| |
||
12 | |{background-color:#ffc}. Low| Nokogiri vulnerabilities (#42333)|"GHSA-vvfq-8hwr-qm4m":https://github.com/advisories/GHSA-vvfq-8hwr-qm4m||All prior releases|version:6.0.4, version:5.1.7 and version:5.0.12| |
||
13 | |{background-color:#ff8}. Moderate|Insufficient permission check with watchers: the "Add watchers" permission effectively also granted "View watchers" (#40946)|"CVE-2024-47225":https://www.cve.org/CVERecord?id=CVE-2024-47225|Jens Krämer of Planio (@jkraemer), Felix Schäfer of Planio (@felix)|All prior releases|version:5.1.4 and version:5.0.10| |
||
14 | |{background-color:#fb8}. High| XSS in Textile formatter (#38807) |"CVE-2023-47259":https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-47259, "JVN#13618065":https://jvn.jp/en/jp/JVN13618065/|Shiga Takuma of BroadBand Security, Inc., JPCERT/CC|All prior releases|version:5.0.6 and version:4.2.11| |
||
15 | |{background-color:#fb8}. High| XSS in Markdown formatter (#38806) |"CVE-2023-47258":https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-47258|Sam Bagheri|All prior releases|version:5.0.6 and version:4.2.11| |
||
16 | |{background-color:#fb8}. High| XSS Vulnerability in Thumbnails (#38417) |"CVE-2023-47260":https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-47260|An anonymous researcher|All prior releases|version:5.0.6 and version:4.2.11| |
||
17 | |{background-color:#ff8}. Moderate|Insufficient permission checks when adding attachments to issues (#38297)||Holger Just of Planio (@hjust)|All prior releases|version:5.0.5 and version:4.2.10| |
||
18 | |{background-color:#ffc}. Low|Avoid double-render error with ApplicationController#find_optional_project (#38063)||Holger Just of Planio (@hjust)|All prior releases|version:5.0.5 and version:4.2.10| |
||
19 | |{background-color:#f88}. Critical|Access Control Issue in attachments#download_all (#37772)|"CVE-2022-44030":https://www.cve.org/CVERecord?id=CVE-2022-44030|Robert Dick|version:"5.0.0" - version:"5.0.3"|version:5.0.4| |
||
20 | |{background-color:#fb8}. High|Persistent XSS in textile formatting due to blockquote citation (#37751) |"CVE-2022-44031":https://cve.report/CVE-2022-44031|Frans Rosén|All prior releases|version:5.0.4 and version:4.2.9| |
||
21 | |{background-color:#fb8}. High|Redmine contains a cross-site scripting vulnerability (#37767)|"CVE-2022-44637":https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-44637, "JVN#60211811":https://jvn.jp/en/jp/JVN60211811/|Shiga Takuma of BroadBand Security, Inc., JPCERT/CC|All prior releases|version:5.0.4 and version:4.2.9| |
||
22 | |{background-color:#ff8}. Moderate|Open Redirect in attachments#download_all (#37880)||Holger Just of Planio (@hjust)|All prior releases since version:"4.2.0"|version:5.0.4 and version:4.2.9| |
||
23 | |{background-color:#ff8}. Moderate|Unbounded resource exhaustion in cmark-gfm autolink extension may lead to denial of service (#37872)|"CVE-2022-39209":https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-39209||version:"5.0.0" - version:"5.0.3"|version:5.0.4| |
||
24 | |{background-color:#ff8}. Moderate|no-permission-check allows issue creation in closed/archived projects (#37187)||Felix Schäfer of Planio (@felix)|All prior releases|version:5.0.2 and version:4.2.7| |
||
25 | |{background-color:#fb8}. High|Information Leak in QueryAssociationColumn and QueryAssociationCustomFieldColumn (#37255)||Felix Schäfer of Planio (@felix)|All prior releases since version:"3.4.0"|version:5.0.2 and version:4.2.7| |
||
26 | |{background-color:#fb8}. High |Remote code execution in @commonmarker@ gem (#37136) |"CVE-2022-24724":https://github.com/github/cmark-gfm/security/advisories/GHSA-mc3g-88wq-6f4x||version:"5.0.0" and version:"5.0.1"|version:5.0.2| |
||
27 | |{background-color:#ff8}. Moderate |3 XSS security vulnerabilities in jQuery UI < v1.13.0 (#37256) |"CVE-2021-41182":https://www.cvedetails.com/cve/CVE-2021-41182/, "CVE-2021-41183":https://www.cvedetails.com/cve/CVE-2021-41183/, "CVE-2021-41184":https://www.cvedetails.com/cve/CVE-2021-41184/||All prior releases|version:"5.0.2" and version:4.2.7| |
||
28 | |{background-color:#ff8}. Moderate |Ruby on Rails vulnerability ("announcement":https://rubyonrails.org/2022/4/26/Rails-7-0-2-4-6-1-5-1-6-0-4-8-and-5-2-7-1-have-been-released)|"CVE-2022-22577":https://discuss.rubyonrails.org/t/cve-2022-22577-possible-xss-vulnerability-in-action-pack/80533, "CVS-2022-27777":https://discuss.rubyonrails.org/t/cve-2022-27777-possible-xss-vulnerability-in-action-view-tag-helpers/80534||All prior releases|version:5.0.1 and version:4.2.6| |
||
29 | |{background-color:#ff8}. Moderate |Ruby on Rails vulnerability ("announcement":https://rubyonrails.org/2022/2/11/Rails-7-0-2-2-6-1-4-6-6-0-4-6-and-5-2-6-2-have-been-released)|"CVE-2022-23633":https://discuss.rubyonrails.org/t/cve-2022-23633-possible-exposure-of-information-vulnerability-in-action-pack/80016||All Redmine 4.* versions|version:4.2.4 and version:4.1.6| |
||
30 | |{background-color:#ff8}. Moderate|Activities index view is leaking usernames (#35789)|"CVE-2021-42326":https://nvd.nist.gov/vuln/detail/CVE-2021-42326|Mischa The Evil (@Mischa)|All prior releases|version:4.2.3 and version:4.1.5| |
||
31 | |{background-color:#ffc}. Low|User sessions not reset after activation of two-factor authentication (#35417)|"CVE-2021-37156":https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-37156|Felix Schäfer of Planio (@felix)|version:4.2.0 and version:4.2.1|version:4.2.2| |
||
32 | |{background-color:#fb8}. High |Ruby on Rails vulnerabilities ("announcement":https://weblog.rubyonrails.org/2021/5/5/Rails-versions-6-1-3-2-6-0-3-7-5-2-4-6-and-5-2-6-have-been-released/)|"CVE-2021-22885":https://discuss.rubyonrails.org/t/cve-2021-22885-possible-information-disclosure-unintended-method-execution-in-action-pack/77868, "CVE-2021-22904":https://discuss.rubyonrails.org/t/cve-2021-22904-possible-dos-vulnerability-in-action-controller-token-authentication/77869||All prior releases|version:4.2.2 and version:4.1.4| |
||
33 | |{background-color:#ffc}. Low|Mail handler bypasses add_issue_notes permission (#35045)|"CVE-2021-31864":https://nvd.nist.gov/vuln/detail/CVE-2021-31864|Holger Just of Planio (@hjust)|All prior releases since version:3.3.0|version:4.2.1, version:4.1.3 and version:4.0.9| |
||
34 | |{background-color:#ff8}. Moderate|Allowed filename extensions of attachments can be circumvented (#34367)|"CVE-2021-31865":https://nvd.nist.gov/vuln/detail/CVE-2021-31865|Bartu Ogur|All prior releases|version:4.2.1, version:4.1.3 and version:4.0.9| |
||
35 | |{background-color:#f88}. Critical|Arbitrary file read in Git adapter (#35085)|"CVE-2021-31863":https://nvd.nist.gov/vuln/detail/CVE-2021-31863|niubl of TSRC (Tencent Security Response Center)|All prior releases|version:4.2.1, version:4.1.3 and version:"4.0.9"| |
||
36 | |{background-color:#ff8}. Moderate|SysController and MailHandlerController are vulnerable to timing attack (#34950)|"CVE-2021-31866":https://nvd.nist.gov/vuln/detail/CVE-2021-31866|wonda-tea-coffee|All prior releases to version:4.2.0|version:4.2.0, version:4.1.3 and version:"4.0.9"| |
||
37 | |{background-color:#fb8}. High|Inline issue auto complete doesn't sanitize HTML tags (#33846)|"CVE-2021-29274":https://nvd.nist.gov/vuln/detail/CVE-2021-29274|Fernando Hartmann (@matafagafo)|version:4.1.0 and version:4.1.1 |version:4.1.2 and version:4.0.8| |
||
38 | |{background-color:#ff8}. Moderate|Names of private projects are leaked by issue journal details that contain project_id changes (#33360)|"CVE-2021-30163":https://nvd.nist.gov/vuln/detail/CVE-2021-30163|Mischa The Evil (@Mischa)|All prior releases|version:4.1.2 and version:4.0.8| |
||
39 | |{background-color:#fb8}. High|Issues API bypasses add_issue_notes permission (#33689)|"CVE-2021-30164":https://nvd.nist.gov/vuln/detail/CVE-2021-30164|Mizuki ISHIKAWA (@ishikawa999)|All prior releases since version:3.3.0|version:4.1.2 and version:4.0.8| |
||
40 | |{background-color:#fb8}. High |Ruby on Rails vulnerabilities ("rails 5.2.4.3":https://weblog.rubyonrails.org/2020/5/18/Rails-5-2-4-3-and-6-0-3-1-have-been-released/, "rails 5.2.4.5":https://weblog.rubyonrails.org/2021/2/10/Rails-5-2-4-5-6-0-3-5-and-6-1-2-1-have-been-released/)|"CVE-2020-8162":https://nvd.nist.gov/vuln/detail/CVE-2020-8162, "CVE-2020-8164":https://nvd.nist.gov/vuln/detail/CVE-2020-8164, "CVE-2020-8165":https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-8165, "CVE-2020-8166":https://nvd.nist.gov/vuln/detail/CVE-2020-8166, "CVE-2020-8167":https://nvd.nist.gov/vuln/detail/CVE-2020-8167, "CVE-2021-22880":https://nvd.nist.gov/vuln/detail/CVE-2021-22880, "CVE-2021-22881":https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22881||All prior releases|version:4.1.2 and version:4.0.8| |
||
41 | |{background-color:#ff8}. Moderate|XSS vulnerability due to missing back_url validation (#32850)|"CVE-2020-36306":https://nvd.nist.gov/vuln/detail/CVE-2020-36306|Nakayama DAISUKE|All prior releases|version:4.1.1 and version:4.0.7| |
||
42 | |{background-color:#fb8}. High|Persistent XSS vulnerabilities in textile inline links (#32934)|"CVE-2020-36307":https://nvd.nist.gov/vuln/detail/CVE-2020-36307|Maik Stegemann|All prior releases|version:4.1.1 and version:4.0.7| |
||
43 | |{background-color:#ff8}. Moderate|Time entries CSV export may disclose subjects of issues that are not visible (#33075)|"CVE-2020-36308":https://nvd.nist.gov/vuln/detail/CVE-2020-36308|Mizuki ISHIKAWA (@ishikawa999)|All prior releases|version:4.1.1 and version:4.0.7| |
||
44 | |{background-color:#ff8}. Moderate|Improper markup sanitization in Textile formatting (#25742)|"CVE-2019-25026":https://nvd.nist.gov/vuln/detail/CVE-2019-25026|Holger Just of Planio (@hjust)|All prior releases|version:4.0.6 and version:3.4.13| |
||
45 | |{background-color:#f88}. Critical|SQL injection (#32374)|"CVE-2019-18890":https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-18890|Holger Just of Planio (@hjust)|Redmine <= 3.3.9|version:3.3.10| |
||
46 | |{background-color:#fb8}. High|Persistent XSS in textile formatting (#31520)|"CVE-2019-17427":https://nvd.nist.gov/vuln/detail/CVE-2019-17427|Глеб Будило|All prior releases|version:3.4.11 and version:4.0.4| |
||
47 | |{background-color:#f88}. Critical|Ruby on Rails vulnerabilities ("announcement":https://weblog.rubyonrails.org/2019/3/13/Rails-4-2-5-1-5-1-6-2-have-been-released/)|"CVE-2019-5418":https://github.com/mpgn/CVE-2019-5418, "CVE-2019-5419":https://nvd.nist.gov/vuln/detail/CVE-2019-5419, "CVE-2019-5420":https://nvd.nist.gov/vuln/detail/CVE-2019-5420||All prior releases|version:3.4.10 and version:4.0.3| |
||
48 | |{background-color:#fb8}. High|Remote command execution through mercurial adapter (#27516)|"CVE-2017-18026":https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18026|All prior releases|Yuya Nishihara|version:3.2.9, version:3.3.6 and version:3.4.4| |
||
49 | |{background-color:#fb8}. High|Multiple XSS vulnerabilities (#27186)|"CVE-2017-15568":https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15568, "CVE-2017-15569":https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15569, "CVE-2017-15570":https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15570, "CVE-2017-15571":https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15571|Andi Fink|All prior releases|version:3.2.8, version:3.3.5 and version:3.4.3| |
||
50 | |{background-color:#ffc}. Low|Email reminders reveal information about inaccessible issues (#25713)|"CVE-2017-16804":https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16804|Felix Schäfer of Planio (@felix)|All prior releases|version:3.2.7, version:3.3.4 and version:3.4.0| |
||
51 | |{background-color:#ff8}. Moderate|Improper markup sanitization in wiki content (#25503)|"CVE-2017-15573":https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15573|Nikita|All prior releases|version:3.2.6 and version:3.3.3| |
||
52 | |{background-color:#ff8}. Moderate|Use redirect on /account/lost_password to prevent password reset tokens in referers (#24416)|"CVE-2017-15572":https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15572|Felix Schäfer of Planio (@felix)|All prior releases|version:3.2.6 and version:3.3.3| |
||
53 | |{background-color:#ff8}. Moderate|Redmine.pm doesn't check that the repository module is enabled on project (#24307)|"CVE-2017-15575":https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15575|Holger Just of Planio (@hjust)|All prior releases|version:3.2.6 and version:3.3.3| |
||
54 | |{background-color:#fb8}. High|Stored XSS with SVG attachments (#24199)|"CVE-2017-15574":https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15574|Faisal ait hamou|All prior releases|version:3.2.6 and version:3.3.3| |
||
55 | |{background-color:#ff8}. Moderate|Information leak when rendering Time Entry on activity view (#23803)|"CVE-2017-15576":https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15576|Holger Just of Planio (@hjust)|All prior releases|version:3.2.6 and version:3.3.3| |
||
56 | |{background-color:#ff8}. Moderate|Information leak when rendering Wiki links (#23793)|"CVE-2017-15577":https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15577|Holger Just of Planio (@hjust)|All prior releases|version:3.2.6 and version:3.3.3| |
||
57 | |{background-color:#fb8}. High|Persistent XSS vulnerabilities in text formatting (Textile and Markdown) and project homepage (#22924, #22925, #22926)|"CVE-2016-10515":https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10515|Olga Yanushkevich from ERNW GmbH|All prior releases|version:3.2.3| |
||
58 | |{background-color:#f88}. Critical|ImageMagick vulnerabilities|"CVE-2016-3714":https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3714, "ImageTragick":https://imagetragick.com/||All prior releases since 2.1.0|version:3.1.5 and version:3.2.2| |
||
59 | |{background-color:#ff8}. Moderate|Data disclosure in atom feed (#21419)|"CVE-2015-8537":https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8537|Jens Krämer of Planio (@jkraemer)|All prior releases|version:2.6.9, version:3.0.7 and version:3.1.3| |
||
60 | |{background-color:#ff8}. Moderate|Potential changeset message disclosure in issues API (#21136)|"CVE-2015-8473":https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8473|Felix Schäfer of Planio (@felix)|All prior releases|version:2.6.8, version:3.0.6 and version:3.1.2| |
||
61 | |{background-color:#ff8}. Moderate|Data disclosure on the time logging form (#21150)|"CVE-2015-8346":https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8346|Holger Just of Planio (@hjust)|All prior releases|version:2.6.8, version:3.0.6 and version:3.1.2| |
||
62 | |{background-color:#ff8}. Moderate|Open Redirect vulnerability (#19577)|"CVE-2015-8474":https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8474|Holger Just of Planio (@hjust)|2.5.1 to 2.6.6, 3.0.0 to 3.0.4 and 3.1.0|version:2.6.7, version:3.0.5 and version:3.1.1| |
||
63 | |{background-color:#ffc}. Low|Potential XSS vulnerability when rendering some flash messages (#19117)|"CVE-2015-8477":https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8477|Holger Just of Planio (@hjust)|All prior releases|version:2.6.2 and version:3.0.0| |
||
64 | |{background-color:#ff8}. Moderate|Potential data leak (project names) in the invalid form authenticity token error screen (#16511)|| Buntaro Orita (@aBuntaroOrita)|All prior releases|version:2.4.6 and version:2.5.2| |
||
65 | |{background-color:#ff8}. Moderate|Open Redirect vulnerability (#16466)|"JVN#93004610":https://jvn.jp/en/jp/JVN93004610/, "CVE-2014-1985":https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2014-1985||All prior releases|version:2.4.5 and version:2.5.1| |
||
66 | |{background-color:#f88}. Critical|Ruby on Rails vulnerability ("announcement":http://weblog.rubyonrails.org/2013/3/18/SEC-ANN-Rails-3-2-13-3-1-12-and-2-3-18-have-been-released/)|||All releases prior to 2.2.4|version:2.2.4, version:2.3.0| |
||
67 | |{background-color:#f88}. Critical|Ruby on Rails vulnerability ("announcement":http://weblog.rubyonrails.org/2013/2/11/SEC-ANN-Rails-3-2-12-3-1-11-and-2-3-17-have-been-released/)|||All releases prior to 2.2.3|version:2.2.3| |
||
68 | |{background-color:#f88}. Critical|Ruby on Rails vulnerability ("announcement":https://groups.google.com/forum/?fromgroups=#!topic/rubyonrails-security/1h2DR63ViGo)| "CVE-2013-0333":https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0333||All releases prior to and including 1.4.7 | "Fix for 1.4.7":/news/78 | |
||
69 | |{background-color:#f88}. Critical|Ruby on Rails vulnerability ("announcement":https://groups.google.com/forum/#!msg/rubyonrails-security/c7jT-EeN9eI/L0u4e87zYGMJ)| "CVE-2013-0155":https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0155||All prior releases| version:2.2.1, version:2.1.6, version:1.4.7 | |
||
70 | |{background-color:#f88}. Critical|Ruby on Rails vulnerability ("announcement":https://groups.google.com/forum/#!topic/rubyonrails-security/61bkgvnSGTQ)| "CVE-2013-0156":https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0156||All prior releases| version:2.2.1, version:2.1.6, version:1.4.6 | |
||
71 | |{background-color:#ff8}. Moderate|XSS vulnerability (#11929)||Jonathan Tietz|2.1.0 and 2.1.1|version:2.1.2| |
||
72 | |{background-color:#fb8}. High|Persistent XSS vulnerability|"JVN#93406632":https://jvn.jp/en/jp/JVN93406632/, "CVE-2012-0327":https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2012-0327|Kousuke Ebihara, JPCERT/CC|All prior releases|version:1.3.2| |
||
73 | |{background-color:#ff8}. Moderate|Mass-assignemnt vulnerability that would allow an attacker to bypass part of the security checks (#10390)||John Yani (@Vanuan), Jean-Philippe Lang (@jplang)|All prior releases|version:1.3.2| |
||
74 | |{background-color:#fb8}. High|Vulnerability that would allow an attacker to bypass the CSRF protection||All |prior releases|version:1.3.0| |