CVE-2012-2054

Source
https://nvd.nist.gov/vuln/detail/CVE-2012-2054
Import Source
https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2012-2054.json
JSON Data
https://api.test.osv.dev/v1/vulns/CVE-2012-2054
Published
2012-04-05T14:55:05Z
Modified
2025-02-07T05:00:04Z
Summary
[none]
Details

Redmine before 1.3.2 does not properly restrict the use of a hash to provide values for a model's attributes, which allows remote attackers to set attributes in the (1) Comment, (2) Document, (3) IssueCategory, (4) MembersController, (5) Message, (6) News, (7) TimeEntry, (8) Version, (9) Wiki, (10) UserPreference, or (11) Board model via a modified URL, related to a "mass assignment" vulnerability, a different vulnerability than CVE-2012-0327.

References

Affected packages

Debian:12 / redmine

Package

Name
redmine
Purl
pkg:deb/debian/redmine?arch=source

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
1.3.2+dfsg1-1

Ecosystem specific

{
    "urgency": "not yet assigned"
}