CVE-2012-2054
Vulnerability from cvelistv5
Published
2012-04-04 10:00
Modified
2024-09-16 20:17
Severity ?
EPSS score ?
Summary
Redmine before 1.3.2 does not properly restrict the use of a hash to provide values for a model's attributes, which allows remote attackers to set attributes in the (1) Comment, (2) Document, (3) IssueCategory, (4) MembersController, (5) Message, (6) News, (7) TimeEntry, (8) Version, (9) Wiki, (10) UserPreference, or (11) Board model via a modified URL, related to a "mass assignment" vulnerability, a different vulnerability than CVE-2012-0327.
References
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-06T19:17:27.804Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.redmine.org/versions/42" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.redmine.org/issues/10390" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.redmine.org/boards/2/topics/29343" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "descriptions": [ { "lang": "en", "value": "Redmine before 1.3.2 does not properly restrict the use of a hash to provide values for a model\u0027s attributes, which allows remote attackers to set attributes in the (1) Comment, (2) Document, (3) IssueCategory, (4) MembersController, (5) Message, (6) News, (7) TimeEntry, (8) Version, (9) Wiki, (10) UserPreference, or (11) Board model via a modified URL, related to a \"mass assignment\" vulnerability, a different vulnerability than CVE-2012-0327." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2012-04-04T10:00:00Z", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.redmine.org/versions/42" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.redmine.org/issues/10390" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.redmine.org/boards/2/topics/29343" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2012-2054", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Redmine before 1.3.2 does not properly restrict the use of a hash to provide values for a model\u0027s attributes, which allows remote attackers to set attributes in the (1) Comment, (2) Document, (3) IssueCategory, (4) MembersController, (5) Message, (6) News, (7) TimeEntry, (8) Version, (9) Wiki, (10) UserPreference, or (11) Board model via a modified URL, related to a \"mass assignment\" vulnerability, a different vulnerability than CVE-2012-0327." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "http://www.redmine.org/versions/42", "refsource": "CONFIRM", "url": "http://www.redmine.org/versions/42" }, { "name": "http://www.redmine.org/issues/10390", "refsource": "CONFIRM", "url": "http://www.redmine.org/issues/10390" }, { "name": "http://www.redmine.org/boards/2/topics/29343", "refsource": "CONFIRM", "url": "http://www.redmine.org/boards/2/topics/29343" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2012-2054", "datePublished": "2012-04-04T10:00:00Z", "dateReserved": "2012-04-04T00:00:00Z", "dateUpdated": "2024-09-16T20:17:00.137Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1", "meta": { "nvd": "{\"cve\":{\"id\":\"CVE-2012-2054\",\"sourceIdentifier\":\"cve@mitre.org\",\"published\":\"2012-04-05T14:55:05.840\",\"lastModified\":\"2012-04-05T14:55:05.840\",\"vulnStatus\":\"Analyzed\",\"descriptions\":[{\"lang\":\"en\",\"value\":\"Redmine before 1.3.2 does not properly restrict the use of a hash to provide values for a model\u0027s attributes, which allows remote attackers to set attributes in the (1) Comment, (2) Document, (3) IssueCategory, (4) MembersController, (5) Message, (6) News, (7) TimeEntry, (8) Version, (9) Wiki, (10) UserPreference, or (11) Board model via a modified URL, related to a \\\"mass assignment\\\" vulnerability, a different vulnerability than CVE-2012-0327.\"},{\"lang\":\"es\",\"value\":\"Redmine antes de v1.3.2 no restringe adecuadamente el uso de un hash para proporcionar los valores de los atributos de un modelo, lo que permite a atacantes remotos establecer los atributos en los modelos (1) Comment, (2) Document, (3) IssueCategory, (4) MembersController, (5) Message, (6) News, (7) TimeEntry, (8) Version, (9) Wiki, (10) UserPreference, or (11) Board, a trav\u00e9s de una URL modificada, en relaci\u00f3n con una vulnerabilidad de \\\"asignacion en masa\\\". Se trata de una vulnerabilidad diferente a CVE-2012-0327.\"}],\"metrics\":{\"cvssMetricV2\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"2.0\",\"vectorString\":\"AV:N/AC:L/Au:N/C:N/I:P/A:N\",\"accessVector\":\"NETWORK\",\"accessComplexity\":\"LOW\",\"authentication\":\"NONE\",\"confidentialityImpact\":\"NONE\",\"integrityImpact\":\"PARTIAL\",\"availabilityImpact\":\"NONE\",\"baseScore\":5.0},\"baseSeverity\":\"MEDIUM\",\"exploitabilityScore\":10.0,\"impactScore\":2.9,\"acInsufInfo\":false,\"obtainAllPrivilege\":false,\"obtainUserPrivilege\":false,\"obtainOtherPrivilege\":false,\"userInteractionRequired\":false}]},\"weaknesses\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-255\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:redmine:redmine:*:*:*:*:*:*:*:*\",\"versionEndIncluding\":\"1.3.1\",\"matchCriteriaId\":\"3DB2CE1C-9830-4ED9-99C7-4C8DE5218232\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:redmine:redmine:0.1.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"DCCB74CF-B69C-4ACF-B676-17082D54A769\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:redmine:redmine:0.2.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D0254A2D-10A5-4843-BE58-72A3B5284DB1\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:redmine:redmine:0.2.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E19773B3-33A6-439A-93BB-1FB4FA86D4D8\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:redmine:redmine:0.3.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1314065B-1B7A-41BC-89F2-EAEE8EA8A6BA\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:redmine:redmine:0.4.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F0BE09F2-954D-4A3E-B2D1-981EEF6AD0CF\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:redmine:redmine:0.4.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"FBEA2E09-2CA8-4999-A841-02A8488F851A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:redmine:redmine:0.4.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F99DB71A-FBBE-4FFF-8EC6-D0EDAE8EDEF3\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:redmine:redmine:0.5.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"CF1E2430-4FFB-4AB4-A2BD-55711486D257\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:redmine:redmine:0.5.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0026FFCE-D748-41F4-B4E8-9852B3ED9532\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:redmine:redmine:0.6.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"554098E4-A9E5-4153-B8CD-8C987B7A8527\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:redmine:redmine:0.6.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"117F62E1-BEC6-416F-AD68-BC1AA260CC1D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:redmine:redmine:0.6.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"086659CB-5DD4-4B19-8223-76A85DF82D46\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:redmine:redmine:0.6.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1850A5B4-747D-4D6F-B625-7DE4857790E8\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:redmine:redmine:0.6.4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5FDE853B-C003-4C9F-9A00-AF84CCD0A05F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:redmine:redmine:0.7.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E235F356-CE27-4CFC-A064-D93E3FE0C7AE\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:redmine:redmine:0.7.0:rc1:*:*:*:*:*:*\",\"matchCriteriaId\":\"7F66B7C8-0D70-4E53-90BC-938101BEB3B4\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:redmine:redmine:0.7.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D4EDE791-F1E6-4E9C-9924-9AA8A34A2D36\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:redmine:redmine:0.7.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A25E4182-E8BE-45BC-A591-463963D51341\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:redmine:redmine:0.7.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"450BD64C-120C-4803-84D8-7A2186B148B5\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:redmine:redmine:0.7.4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"650A5A39-D2F1-41D1-B985-7051D0035B50\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:redmine:redmine:0.8.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0012C0B4-0B5A-4588-A81F-32652DECDA45\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:redmine:redmine:0.8.0:rc1:*:*:*:*:*:*\",\"matchCriteriaId\":\"052CA2E7-73E8-4BA2-A98E-A527D635505D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:redmine:redmine:0.8.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D961E2C0-4061-4CCA-AA6A-6CB3AA096933\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:redmine:redmine:0.8.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B91BB4D5-4700-4874-8473-5CF8C9A39B5D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:redmine:redmine:0.8.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"69C39736-8851-4072-89C7-9635CC28BD02\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:redmine:redmine:0.8.4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F8C1857C-A87F-4BE1-A4D9-458310DF0F3B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:redmine:redmine:0.8.5:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"ECBDF1A1-9739-4725-B3F8-D43A1847AB29\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:redmine:redmine:0.8.6:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D2E33486-ECAA-4568-86EE-40CAE068040A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:redmine:redmine:0.8.7:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"DDB7D5EA-D7CE-429B-BDD7-1908460FC539\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:redmine:redmine:0.9.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7129BEFA-1A70-43A8-A27B-EA1B2B8BDF75\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:redmine:redmine:0.9.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E2C96214-FB72-4423-AFCD-D66E531BD6C1\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:redmine:redmine:0.9.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4AAF1F2E-7E6A-4F22-9511-77B4173239E5\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:redmine:redmine:0.9.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"785C388F-C871-4DE9-B636-5B127C71B017\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:redmine:redmine:0.9.4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"40F5A2B6-F225-4091-A491-B316D31A0C0E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:redmine:redmine:0.9.5:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0BA62C29-81F4-45E0-AFB6-E017AC207730\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:redmine:redmine:0.9.6:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"BBAA9096-AD1A-4C5B-92C6-00A46D41A5E3\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:redmine:redmine:1.0.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B86BADC4-2765-40C9-8D95-C6628497F292\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:redmine:redmine:1.0.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"DED843A9-D03E-457B-AC21-784CF6197C83\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:redmine:redmine:1.0.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8CB464C7-DEE0-4AF5-A782-D14965C76970\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:redmine:redmine:1.0.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1B8E588D-54E8-4E9F-A191-965923AF7DB0\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:redmine:redmine:1.0.4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"31BDDECE-EF68-414B-B5D2-CEB31E25327B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:redmine:redmine:1.0.5:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"65A4E6A2-895C-4D8D-9A7C-5DAA35704CF3\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:redmine:redmine:1.1.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A77E2F14-1089-4152-9AFA-943B922CEF30\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:redmine:redmine:1.1.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"60876FFF-6FD3-4706-945B-4A54547204BC\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:redmine:redmine:1.1.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"99AD9B02-F78B-4CD9-A17E-4E21737AA081\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:redmine:redmine:1.1.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"DA23EC17-0C98-49A6-A9FD-F3133F219770\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:redmine:redmine:1.2.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1AACB99C-C82F-4825-AD9B-C5CDDCC60490\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:redmine:redmine:1.2.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6E290527-573D-43EA-8701-4E1A31B1EBBA\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:redmine:redmine:1.2.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"22C09F5D-91AD-4BE6-B3E7-5032628D762F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:redmine:redmine:1.2.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0E6D1873-C212-40C7-B6C6-1CF77434DBEE\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:redmine:redmine:1.3.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"3B623EB4-3A90-47EE-8891-431AF0919B2F\"}]}]}],\"references\":[{\"url\":\"http://www.redmine.org/boards/2/topics/29343\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://www.redmine.org/issues/10390\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://www.redmine.org/versions/42\",\"source\":\"cve@mitre.org\"}]}}" } }
Loading...
Loading...
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.