CVE-2012-2054Improperly Controlled Modification of Dynamically-Determined Object Attributes in Redmine

Severity
5.0MEDIUMNVD
OSV4.3
EPSS
0.3%
top 49.10%
CISA KEV
Not in KEV
Exploit
No known exploits
Affected products
Timeline
PublishedApr 5
Latest updateMay 17

Description

Redmine before 1.3.2 does not properly restrict the use of a hash to provide values for a model's attributes, which allows remote attackers to set attributes in the (1) Comment, (2) Document, (3) IssueCategory, (4) MembersController, (5) Message, (6) News, (7) TimeEntry, (8) Version, (9) Wiki, (10) UserPreference, or (11) Board model via a modified URL, related to a "mass assignment" vulnerability, a different vulnerability than CVE-2012-0327.

CVSS vector

AV:N/AC:L/C:N/I:P/A:NExploitability: 10.0 | Impact: 2.9

Affected Packages3 packages

debiandebian/redmine< redmine 1.3.2+dfsg1-1 (bookworm)
Debianredmine/redmine< 1.3.2+dfsg1-1+1
NVDredmine/redmine1.3.1+49

🔴Vulnerability Details

2
GHSA
GHSA-fcfx-v2jw-qj3q: Redmine before 12022-05-17
OSV
CVE-2012-2054: Redmine before 12012-04-05

📋Vendor Advisories

1
Debian
CVE-2012-2054: redmine - Redmine before 1.3.2 does not properly restrict the use of a hash to provide val...2012

📐Framework References

1
CWE
Improperly Controlled Modification of Dynamically-Determined Object Attributes