In Redmine before 3.2.6 and 3.3.x before 3.3.3, remote attackers can obtain sensitive information (password reset tokens) by reading a Referer log, because account/lost_password does not use a redirect.
References
Link | Resource |
---|---|
https://www.debian.org/security/2018/dsa-4191 | Third Party Advisory |
https://www.redmine.org/issues/24416 | Permissions Required Vendor Advisory |
https://www.redmine.org/projects/redmine/wiki/Security_Advisories | Patch Vendor Advisory |
https://www.debian.org/security/2018/dsa-4191 | Third Party Advisory |
https://www.redmine.org/issues/24416 | Permissions Required Vendor Advisory |
https://www.redmine.org/projects/redmine/wiki/Security_Advisories | Patch Vendor Advisory |
Configurations
History
21 Nov 2024, 03:14
Type | Values Removed | Values Added |
---|---|---|
References | () https://www.debian.org/security/2018/dsa-4191 - Third Party Advisory | |
References | () https://www.redmine.org/issues/24416 - Permissions Required, Vendor Advisory | |
References | () https://www.redmine.org/projects/redmine/wiki/Security_Advisories - Patch, Vendor Advisory |
Information
Published : 2017-10-18 02:29
Updated : 2024-11-21 03:14
NVD link : CVE-2017-15572
Mitre link : CVE-2017-15572
CVE.ORG link : CVE-2017-15572
JSON object : View
Products Affected
debian
- debian_linux
redmine
- redmine
CWE
CWE-532
Insertion of Sensitive Information into Log File