CVE-2015-8473
https://notcve.org/view.php?id=CVE-2015-8473
The Issues API in Redmine before 2.6.8, 3.0.x before 3.0.6, and 3.1.x before 3.1.2 allows remote authenticated users to obtain sensitive information in changeset messages by leveraging permission to read issues with related changesets from other projects. La API Issues en Redmine en versiones anteriores a 2.6.8, 3.0.x en versiones anteriores a 3.0.6 y 3.1.x en versiones anteriores a 3.1.2 permite a usuarios remotos autenticados obtener información sensible de mensajes changeset aprovechando el permiso para leer problemas en relación con changesets de otros proyectos. • http://www.debian.org/security/2016/dsa-3529 http://www.securityfocus.com/bid/78621 https://github.com/redmine/redmine/commit/8d8f612fa368a72c56b63f7ce6b7e98cab9feb22 https://www.redmine.org/issues/21136 https://www.redmine.org/projects/redmine/wiki/Changelog_3_0 https://www.redmine.org/projects/redmine/wiki/Changelog_3_1 https://www.redmine.org/versions/105 • CWE-200: Exposure of Sensitive Information to an Unauthorized Actor •
CVE-2015-8474
https://notcve.org/view.php?id=CVE-2015-8474
Open redirect vulnerability in the valid_back_url function in app/controllers/application_controller.rb in Redmine before 2.6.7, 3.0.x before 3.0.5, and 3.1.x before 3.1.1 allows remote attackers to redirect users to arbitrary web sites and conduct phishing attacks via a crafted back_url parameter, as demonstrated by "@attacker.com," a different vulnerability than CVE-2014-1985. Vulnerabilidad de redirección abierta en la función valid_back_url en app/controllers/application_controller.rb en Redmine en versiones anteriores a 2.6.7, 3.0.x en versiones anteriores a 3.0.5 y 3.1.x en versiones anteriores a 3.1.1 permite a atacantes remotos redirigir a usuarios a sitios web arbitrarios y llevar a cabo ataques de phishing a través de un parámetro back_url manipulado, según lo demostrado por "@attacker.com", una vulnerabilidad diferente a CVE-2014-1985. • http://www.debian.org/security/2016/dsa-3529 http://www.redmine.org/news/101 http://www.securityfocus.com/bid/78625 https://github.com/redmine/redmine/commit/032f2c9be6520d9d1a1608aa4f1d5d1f184f2472 https://www.redmine.org/issues/19577 •
CVE-2015-8346
https://notcve.org/view.php?id=CVE-2015-8346
app/views/timelog/_form.html.erb in Redmine before 2.6.8, 3.0.x before 3.0.6, and 3.1.x before 3.1.2 allows remote attackers to obtain sensitive information about subjects of issues by viewing the time logging form. app/views/timelog/_form.html.erb en Redmine en versiones anteriores a 2.6.8, 3.0.x en versiones anteriores a 3.0.6 y 3.1.x en versiones anteriores a 3.1.2 permite a atacantes remotos obtener información sensible sobre temas de problemas visualizando el formulario de tiempo de acceso. • http://www.debian.org/security/2016/dsa-3529 http://www.redmine.org/news/102 https://github.com/redmine/redmine/commit/c096dde88ff02872ba35edc4dc403c80a7867b5c https://www.redmine.org/issues/21150 • CWE-199: Information Management Errors •
CVE-2015-8537
https://notcve.org/view.php?id=CVE-2015-8537
app/views/journals/index.builder in Redmine before 2.6.9, 3.0.x before 3.0.7, and 3.1.x before 3.1.3 allows remote attackers to obtain sensitive information by viewing an Atom feed. app/views/journals/index.builder en Redmine en versiones anteriores a 2.6.9, 3.0.x en versiones anteriores a 3.0.7 y 3.1.x en versiones anteriores a 3.1.3 permite a atacantes remotos obtener información sensible visualizando un feed Atom. • http://www.debian.org/security/2016/dsa-3529 http://www.redmine.org/news/103 https://github.com/redmine/redmine/commit/7e423fb4538247d59e01958c48b491f196a1de56 • CWE-200: Exposure of Sensitive Information to an Unauthorized Actor •
CVE-2013-4663
https://notcve.org/view.php?id=CVE-2013-4663
git_http_controller.rb in the redmine_git_hosting plugin for Redmine allows remote attackers to execute arbitrary commands via shell metacharacters in (1) the service parameter to info/refs, related to the get_info_refs function or (2) the reqfile argument to the file_exists function. git_http_controller.rb en el plugin redmine_git_hosting para Redmine permite a atacantes remotos ejecutar comandos arbitrarios a través de metacaracteres de shell en (1) el parámetro servicio a info/refs, relacionado a la función the get_info_refs o (2) el argumento reqfile a la función file_exists. • http://www.sec-1.com/blog/2013/redmine-git-hosting-plugin-remote-command-execution • CWE-77: Improper Neutralization of Special Elements used in a Command ('Command Injection') •