SB2018050309 - Debian update for redmine



SB2018050309 - Debian update for redmine

Published: May 3, 2018

Security Bulletin ID SB2018050309
Severity
Low
Patch available
YES
Number of vulnerabilities 12
Exploitation vector Remote access
Highest impact Code execution

Breakdown by Severity

Low 100%
  • Low
  • Medium
  • High
  • Critical

Description

This security bulletin contains information about 12 secuirty vulnerabilities.


1) Cross-site scripting (CVE-ID: CVE-2017-15568)

The vulnerability allows a remote attacker to perform cross-site scripting (XSS) attacks.

The weakness exists in app/helpers/application_helper.rb due to insufficient sanitization of user-supplied data. A remote attacker can trick the victim to follow a specially crafted link and execute arbitrary HTML and script code in user's browser in context of vulnerable website.

Successful exploitation of this vulnerability may allow a remote attacker to steal potentially sensitive information, change appearance of the web page, perform phishing and drive-by-download attacks.


2) Cross-site scripting (CVE-ID: CVE-2017-15569)

The vulnerability allows a remote attacker to perform cross-site scripting (XSS) attacks.

The weakness exists in app/helpers/queries_helper.rb due to insufficient sanitization of user-supplied data. A remote attacker can trick the victim to follow a specially crafted link and execute arbitrary HTML and script code in user's browser in context of vulnerable website.

Successful exploitation of this vulnerability may allow a remote attacker to steal potentially sensitive information, change appearance of the web page, perform phishing and drive-by-download attacks.


3) Cross-site scripting (CVE-ID: CVE-2017-15570)

The vulnerability allows a remote attacker to perform cross-site scripting (XSS) attacks.

The weakness exists in app/views/timelog/_list.html.erb due to insufficient sanitization of user-supplied data. A remote attacker can trick the victim to follow a specially crafted link and execute arbitrary HTML and script code in user's browser in context of vulnerable website.

Successful exploitation of this vulnerability may allow a remote attacker to steal potentially sensitive information, change appearance of the web page, perform phishing and drive-by-download attacks.


4) Cross-site scripting (CVE-ID: CVE-2017-15571)

The vulnerability allows a remote attacker to perform cross-site scripting (XSS) attacks.

The weakness exists in app/views/issues/_list.html.erb due to insufficient sanitization of user-supplied data. A remote attacker can trick the victim to follow a specially crafted link and execute arbitrary HTML and script code in user's browser in context of vulnerable website.

Successful exploitation of this vulnerability may allow a remote attacker to steal potentially sensitive information, change appearance of the web page, perform phishing and drive-by-download attacks.


5) Information disclosure through log files (CVE-ID: CVE-2017-15572)

The vulnerability allows a remote attacker to obtain potentially sensitive information.

The vulnerability exists due to account/lost_password does not use a redirect. A remote attacker can read a Referer log and gain access to password reset tokens.


6) Cross-site scripting (CVE-ID: CVE-2017-15573)

The vulnerability allows a remote attacker to perform cross-site scripting (XSS) attacks.

The weakness exists due to insufficient sanitization of user-supplied data. A remote attacker can trick the victim to follow a specially crafted link and execute arbitrary HTML and script code in user's browser in context of vulnerable website.

Successful exploitation of this vulnerability may allow a remote attacker to steal potentially sensitive information, change appearance of the web page, perform phishing and drive-by-download attacks.


7) Cross-site scripting (CVE-ID: CVE-2017-15574)

The vulnerability allows a remote attacker to perform cross-site scripting (XSS) attacks.

The weakness exists due to insufficient sanitization of user-supplied data. A remote attacker can trick the victim to follow a specially crafted link and execute arbitrary HTML and script code in user's browser in context of vulnerable website.

Successful exploitation of this vulnerability may allow a remote attacker to steal potentially sensitive information, change appearance of the web page, perform phishing and drive-by-download attacks.


8) Information disclosure (CVE-ID: CVE-2017-15575)

The vulnerability allows a remote attacker to obtain potentially sensitive information.

The weakness exists due to Redmine.pm lacks a check for whether the Repository module is enabled in a project's settings. A remote attacker can gain access to potentially sensitive information.


9) Information disclosure (CVE-ID: CVE-2017-15576)

The vulnerability allows a remote attacker to obtain potentially sensitive information.

The weakness exists due to mishandling Time Entry rendering in activity views. A remote attacker can gain access to potentially sensitive information.


10) Information disclosure (CVE-ID: CVE-2017-15577)

The vulnerability allows a remote attacker to obtain potentially sensitive information.

The weakness exists due to mishandling the rendering of wiki links. A remote attacker can gain access to potentially sensitive information.


11) Information disclosure (CVE-ID: CVE-2017-16804)

The vulnerability allows a remote authenticated attacker to obtain potentially sensitive information.

The weakness exists in the reminders function in app/models/mailer.r due to improper check for whether an issue is visible. A remote attacker can read e-mail reminder messages and gain access to potentially sensitive information.


12) Command injection (CVE-ID: CVE-2017-18026)

The vulnerability allows a remote attacker to execute arbitrary commands on the target system.

The weakness exists due to improper blocking of the --config and --debugger flags to the Mercurial hg program. A remote attacker can execute arbitrary commands through the Mercurial adapter via vectors involving a branch whose name begins with a --config= or --debugger= substring.


Remediation

Install update from vendor's website.