Redmine before 4.0.7 and 4.1.x before 4.1.1 allows attackers to discover the subject of a non-visible issue by performing a CSV export and reading time entries.
{ "binaries": [ { "binary_name": "redmine", "binary_version": "3.2.1-2ubuntu0.2" }, { "binary_name": "redmine-mysql", "binary_version": "3.2.1-2ubuntu0.2" }, { "binary_name": "redmine-pgsql", "binary_version": "3.2.1-2ubuntu0.2" }, { "binary_name": "redmine-sqlite", "binary_version": "3.2.1-2ubuntu0.2" } ] }
{ "binaries": [ { "binary_name": "redmine", "binary_version": "3.4.4-1ubuntu0.1" }, { "binary_name": "redmine-mysql", "binary_version": "3.4.4-1ubuntu0.1" }, { "binary_name": "redmine-pgsql", "binary_version": "3.4.4-1ubuntu0.1" }, { "binary_name": "redmine-sqlite", "binary_version": "3.4.4-1ubuntu0.1" } ] }