Published:2024/05/29 Last Updated:2024/05/29
JVN#22182715
Redmine DMSF Plugin vulnerable to path traversal
Overview
Redmine DMSF Plugin provided by Kontron contains a path traversal vulnerability.
Products Affected
- Redmine DMSF Plugin versions prior to 3.1.4
Description
Redmine DMSF Plugin provided by Kontron contains a path traversal vulnerability (CWE-22).
Impact
When the affected version of the plugin is enabled on the Redmine instance, the logged-in user may obtain or delete arbitrary files on the server (within the privilege of the Redmine process).
Solution
Update the Software
Update the software to the latest version according to the information provided by the developer.
Version 3.1.4 has addressed this vulnerability.
Vendor Status
Vendor | Link |
Kontron | GitHub Redmine DMSF Plugin |
References
JPCERT/CC Addendum
Vulnerability Analysis by JPCERT/CC
CVSS v3
CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
Base Score:
8.8
Attack Vector(AV) | Physical (P) | Local (L) | Adjacent (A) | Network (N) |
---|---|---|---|---|
Attack Complexity(AC) | High (H) | Low (L) | ||
Privileges Required(PR) | High (H) | Low (L) | None (N) | |
User Interaction(UI) | Required (R) | None (N) | ||
Scope(S) | Unchanged (U) | Changed (C) | ||
Confidentiality Impact(C) | None (N) | Low (L) | High (H) | |
Integrity Impact(I) | None (N) | Low (L) | High (H) | |
Availability Impact(A) | None (N) | Low (L) | High (H) |
Credit
Tsukuba Secure Network Research Co. Ltd. reported this vulnerability to IPA.
JPCERT/CC coordinated with the developer under Information Security Early Warning Partnership.
Other Information
JPCERT Alert |
|
JPCERT Reports |
|
CERT Advisory |
|
CPNI Advisory |
|
TRnotes |
|
CVE |
CVE-2024-36267 |
JVN iPedia |
JVNDB-2024-000055 |