First published: Wed Apr 28 2021(Updated: )
Insufficient input validation in the Git repository integration of Redmine before 4.0.9, 4.1.x before 4.1.3, and 4.2.x before 4.2.1 allows Redmine users to read arbitrary local files accessible by the application server process.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Redmine Redmine | <4.0.9 | |
Redmine Redmine | >=4.1.0<4.1.3 | |
Redmine Redmine | >=4.2.0<4.2.1 | |
Debian Debian Linux | =9.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of CVE-2021-31863 is high.
CVE-2021-31863 affects Redmine versions before 4.0.9, 4.1.x before 4.1.3, and 4.2.x before 4.2.1.
CVE-2021-31863 is an insufficient input validation vulnerability in the Git repository integration of Redmine, allowing users to read arbitrary local files accessible by the application server process.
To fix CVE-2021-31863, you should update your Redmine installation to version 4.0.9, 4.1.3, or 4.2.1.
You can find more information about CVE-2021-31863 at the following references: [Link 1](https://lists.debian.org/debian-lts-announce/2021/05/msg00013.html), [Link 2](https://www.redmine.org/news/131), [Link 3](https://www.redmine.org/projects/redmine/wiki/Security_Advisories).