First published: Thu Aug 05 2021(Updated: )
Redmine 4.2.0 and 4.2.1 allow existing user sessions to continue upon enabling two-factor authentication for the user's account, but the intended behavior is for those sessions to be terminated.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Redmine Redmine | =4.2.0 | |
Redmine Redmine | =4.2.1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID for this Redmine vulnerability is CVE-2021-37156.
The severity of CVE-2021-37156 is high.
Redmine versions 4.2.0 and 4.2.1 are affected by CVE-2021-37156.
The intended behavior is for existing user sessions to be terminated upon enabling two-factor authentication, but in CVE-2021-37156, those sessions continue.
Yes, you can find references for CVE-2021-37156 at the following links: [Link 1](https://www.redmine.org/news/132), [Link 2](https://www.redmine.org/projects/redmine/wiki/Security_Advisories)