Arch Linux 764 Published by

A redmine security update has been released for Arch Linux.



ASA-202105-1: redmine: multiple issues


Arch Linux Security Advisory ASA-202105-1
========================================
Severity: Critical
Date : 2021-05-19
CVE-ID : CVE-2021-29274 CVE-2021-30163 CVE-2021-30164 CVE-2021-31863
CVE-2021-31864 CVE-2021-31865 CVE-2021-31866
Package : redmine
Type : multiple issues
Remote : Yes
Link :   https://security.archlinux.org/AVG-1743

Summary
======
The package redmine before version 4.2.1-1 is vulnerable to multiple
issues including arbitrary filesystem access, access restriction
bypass, cross-site scripting, arbitrary file upload and information
disclosure.

Resolution
=========
Upgrade to 4.2.1-1.

# pacman -Syu "redmine>=4.2.1-1"

The problems have been fixed upstream in version 4.2.1.

Workaround
=========
None.

Description
==========
- CVE-2021-29274 (cross-site scripting)

Redmine 4.1.x before 4.1.2 allows cross-site scripting (XSS) because an
issue's subject is mishandled in the auto complete tip.

- CVE-2021-30163 (information disclosure)

Redmine before 4.1.2 allows attackers to discover the names of private
projects if issue-journal details exist that have changes to project_id
values.

- CVE-2021-30164 (access restriction bypass)

Redmine before 4.1.2 allows attackers to bypass the add_issue_notes
permission requirement by leveraging the Issues API.

- CVE-2021-31863 (arbitrary filesystem access)

Insufficient input validation in the Git repository integration of
Redmine before 4.2.1 allows Redmine users to read arbitrary local files
accessible by the application server process.

- CVE-2021-31864 (access restriction bypass)

Redmine before 4.2.1 allows attackers to bypass the add_issue_notes
permission requirement by leveraging the incoming mail handler.

- CVE-2021-31865 (arbitrary file upload)

Redmine before 4.2.1 allows users to circumvent the allowed filename
extensions of uploaded attachments.

- CVE-2021-31866 (information disclosure)

Redmine before 4.1.3 allows an attacker to learn the values of internal
authentication keys by observing timing differences in string
comparison operations within SysController and MailHandlerController.

Impact
=====
A remote attacker could disclose private information, perform actions
without having the required permissions, or execute arbitrary
JavaScript code by leveraging cross-site scripting.

References
=========
  https://bugs.archlinux.org/task/70203
  https://www.redmine.org/projects/redmine/wiki/Security_Advisories
  https://www.redmine.org/issues/33846
  https://github.com/redmine/redmine/commit/bbfade972865e78e4d865af2cdb93e6cb57d5a45
  https://www.redmine.org/issues/33360
  https://github.com/redmine/redmine/commit/0d96c4ebdb1cceeb6cac8f940a11b5407a0a5211
  https://www.redmine.org/issues/33689
  https://github.com/redmine/redmine/commit/a7b9fa99966e8d59bd88548248ab11400ea48e5e
  https://www.redmine.org/issues/35085
  https://github.com/redmine/redmine/commit/45461bfe51e9492d607f7204120f49ce3396a0cf
  https://www.redmine.org/issues/35045
  https://github.com/redmine/redmine/commit/d03a718e6efca0493d8b42bd4ba356d736a77f49
  https://www.redmine.org/issues/34367
  https://github.com/redmine/redmine/commit/56979912c9bb041aac3fc5b88bf8275b743b0e28
  https://www.redmine.org/issues/34950
  https://github.com/redmine/redmine/commit/23e09ef64e26d6f63dcdcd624827440d9ad05f93
  https://security.archlinux.org/CVE-2021-29274
  https://security.archlinux.org/CVE-2021-30163
  https://security.archlinux.org/CVE-2021-30164
  https://security.archlinux.org/CVE-2021-31863
  https://security.archlinux.org/CVE-2021-31864
  https://security.archlinux.org/CVE-2021-31865
  https://security.archlinux.org/CVE-2021-31866