製品・ソフトウェアに関する情報
Redmine における属性を設定される脆弱性
Title Redmine における属性を設定される脆弱性
Summary

Redmine は、model 属性の値を提供するためのハッシュの使用を適切に制限しないため、下記の属性を設定される脆弱性が存在します。 (1) Comment (2) Document (3) IssueCategory (4) MembersController (5) Message (6) News (7) TimeEntry (8) Version (9) Wiki (10) UserPreference (11) Board model 本脆弱性は、CVE-2012-0327 とは異なる脆弱性です。

Possible impacts 第三者により、変更された URL を介して、下記の属性を設定される可能性があります。 (1) Comment (2) Document (3) IssueCategory (4) MembersController (5) Message (6) News (7) TimeEntry (8) Version (9) Wiki (10) UserPreference (11) Board model
Solution

ベンダより正式な対策が公開されています。ベンダ情報を参照して適切な対策を実施してください。

Publication Date March 6, 2012, midnight
Registration Date April 6, 2012, 4:21 p.m.
Last Update April 6, 2012, 4:21 p.m.
CVSS2.0 : 警告
Score 5
Vector AV:N/AC:L/Au:N/C:N/I:P/A:N
Affected System
Redmine
Redmine 1.3.2 未満
CVE (情報セキュリティ 共通脆弱性識別子)
CWE (共通脆弱性タイプ一覧)
ベンダー情報
Change Log
No Changed Details Date of change
0 [2012年04月06日]
  掲載
Feb. 17, 2018, 10:37 a.m.

NVD Vulnerability Information
CVE-2012-2054
Summary

Redmine before 1.3.2 does not properly restrict the use of a hash to provide values for a model's attributes, which allows remote attackers to set attributes in the (1) Comment, (2) Document, (3) IssueCategory, (4) MembersController, (5) Message, (6) News, (7) TimeEntry, (8) Version, (9) Wiki, (10) UserPreference, or (11) Board model via a modified URL, related to a "mass assignment" vulnerability, a different vulnerability than CVE-2012-0327.

Publication Date April 5, 2012, 11:55 p.m.
Registration Date Jan. 28, 2021, 2:57 p.m.
Last Update Nov. 21, 2024, 10:38 a.m.
Affected software configurations
Configuration1 or higher or less more than less than
cpe:2.3:a:redmine:redmine:1.0.5:*:*:*:*:*:*:*
cpe:2.3:a:redmine:redmine:0.9.0:*:*:*:*:*:*:*
cpe:2.3:a:redmine:redmine:0.6.0:*:*:*:*:*:*:*
cpe:2.3:a:redmine:redmine:0.4.1:*:*:*:*:*:*:*
cpe:2.3:a:redmine:redmine:0.8.6:*:*:*:*:*:*:*
cpe:2.3:a:redmine:redmine:1.2.2:*:*:*:*:*:*:*
cpe:2.3:a:redmine:redmine:1.1.0:*:*:*:*:*:*:*
cpe:2.3:a:redmine:redmine:0.7.0:rc1:*:*:*:*:*:*
cpe:2.3:a:redmine:redmine:0.9.6:*:*:*:*:*:*:*
cpe:2.3:a:redmine:redmine:0.7.4:*:*:*:*:*:*:*
cpe:2.3:a:redmine:redmine:0.7.0:*:*:*:*:*:*:*
cpe:2.3:a:redmine:redmine:0.2.2:*:*:*:*:*:*:*
cpe:2.3:a:redmine:redmine:0.7.3:*:*:*:*:*:*:*
cpe:2.3:a:redmine:redmine:0.6.3:*:*:*:*:*:*:*
cpe:2.3:a:redmine:redmine:0.5.0:*:*:*:*:*:*:*
cpe:2.3:a:redmine:redmine:0.6.1:*:*:*:*:*:*:*
cpe:2.3:a:redmine:redmine:1.0.0:*:*:*:*:*:*:*
cpe:2.3:a:redmine:redmine:1.0.3:*:*:*:*:*:*:*
cpe:2.3:a:redmine:redmine:0.9.5:*:*:*:*:*:*:*
cpe:2.3:a:redmine:redmine:0.9.2:*:*:*:*:*:*:*
cpe:2.3:a:redmine:redmine:0.7.2:*:*:*:*:*:*:*
cpe:2.3:a:redmine:redmine:0.7.1:*:*:*:*:*:*:*
cpe:2.3:a:redmine:redmine:0.8.4:*:*:*:*:*:*:*
cpe:2.3:a:redmine:redmine:0.6.2:*:*:*:*:*:*:*
cpe:2.3:a:redmine:redmine:0.4.0:*:*:*:*:*:*:*
cpe:2.3:a:redmine:redmine:0.8.0:*:*:*:*:*:*:*
cpe:2.3:a:redmine:redmine:0.8.0:rc1:*:*:*:*:*:*
cpe:2.3:a:redmine:redmine:0.1.0:*:*:*:*:*:*:*
cpe:2.3:a:redmine:redmine:0.6.4:*:*:*:*:*:*:*
cpe:2.3:a:redmine:redmine:0.4.2:*:*:*:*:*:*:*
cpe:2.3:a:redmine:redmine:0.8.5:*:*:*:*:*:*:*
cpe:2.3:a:redmine:redmine:1.2.1:*:*:*:*:*:*:*
cpe:2.3:a:redmine:redmine:1.1.1:*:*:*:*:*:*:*
cpe:2.3:a:redmine:redmine:0.2.1:*:*:*:*:*:*:*
cpe:2.3:a:redmine:redmine:0.9.4:*:*:*:*:*:*:*
cpe:2.3:a:redmine:redmine:0.9.3:*:*:*:*:*:*:*
cpe:2.3:a:redmine:redmine:0.8.3:*:*:*:*:*:*:*
cpe:2.3:a:redmine:redmine:*:*:*:*:*:*:*:* 1.3.1
cpe:2.3:a:redmine:redmine:1.3.0:*:*:*:*:*:*:*
cpe:2.3:a:redmine:redmine:1.1.3:*:*:*:*:*:*:*
cpe:2.3:a:redmine:redmine:0.5.1:*:*:*:*:*:*:*
cpe:2.3:a:redmine:redmine:0.8.1:*:*:*:*:*:*:*
cpe:2.3:a:redmine:redmine:0.8.2:*:*:*:*:*:*:*
cpe:2.3:a:redmine:redmine:1.0.2:*:*:*:*:*:*:*
cpe:2.3:a:redmine:redmine:0.9.1:*:*:*:*:*:*:*
cpe:2.3:a:redmine:redmine:1.0.1:*:*:*:*:*:*:*
cpe:2.3:a:redmine:redmine:1.0.4:*:*:*:*:*:*:*
cpe:2.3:a:redmine:redmine:0.3.0:*:*:*:*:*:*:*
cpe:2.3:a:redmine:redmine:1.2.3:*:*:*:*:*:*:*
cpe:2.3:a:redmine:redmine:0.8.7:*:*:*:*:*:*:*
cpe:2.3:a:redmine:redmine:1.2.0:*:*:*:*:*:*:*
cpe:2.3:a:redmine:redmine:1.1.2:*:*:*:*:*:*:*
Related information, measures and tools
Common Vulnerabilities List