CVE-2021-31863

Insufficient input validation in the Git repository integration of Redmine before 4.0.9, 4.1.x before 4.1.3, and 4.2.x before 4.2.1 allows Redmine users to read arbitrary local files accessible by the application server process.
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:redmine:redmine:*:*:*:*:*:*:*:*
cpe:2.3:a:redmine:redmine:*:*:*:*:*:*:*:*
cpe:2.3:a:redmine:redmine:*:*:*:*:*:*:*:*

Configuration 2 (hide)

cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*

History

21 Nov 2024, 06:06

Type Values Removed Values Added
References () https://lists.debian.org/debian-lts-announce/2021/05/msg00013.html - Mailing List, Third Party Advisory () https://lists.debian.org/debian-lts-announce/2021/05/msg00013.html - Mailing List, Third Party Advisory
References () https://www.redmine.org/news/131 - Vendor Advisory () https://www.redmine.org/news/131 - Vendor Advisory
References () https://www.redmine.org/projects/redmine/wiki/Security_Advisories - Vendor Advisory () https://www.redmine.org/projects/redmine/wiki/Security_Advisories - Vendor Advisory

Information

Published : 2021-04-28 07:15

Updated : 2024-11-21 06:06


NVD link : CVE-2021-31863

Mitre link : CVE-2021-31863

CVE.ORG link : CVE-2021-31863


JSON object : View

Products Affected

debian

  • debian_linux

redmine

  • redmine
CWE
CWE-20

Improper Input Validation