First published: Thu Mar 29 2018(Updated: )
The Original File and Patched File resources in Review Board 1.7.x before 1.7.27 and 2.0.x before 2.0.4 allow remote authenticated users to bypass intended access restrictions and obtain sensitive information from repository files by leveraging knowledge of database ids.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Review Board | >1.7.0<1.7.27 | |
Review Board | >=2.0<2.0.4 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2014-5028 has been assigned a moderate severity level due to its potential to expose sensitive information.
To fix CVE-2014-5028, upgrade Review Board to version 1.7.27 or later, or to version 2.0.4 or later.
The affected versions for CVE-2014-5028 are Review Board 1.7.x before 1.7.27 and 2.0.x before 2.0.4.
Remote authenticated users can be impacted by CVE-2014-5028 as it allows them to bypass access restrictions.
CVE-2014-5028 is a type of access control vulnerability that enables unauthorized information disclosure from repository files.