Vulnerability Description
In Redmine before 3.2.6 and 3.3.x before 3.3.3, remote attackers can obtain sensitive information (password reset tokens) by reading a Referer log, because account/lost_password does not use a redirect.
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Redmine | Redmine | <= 3.2.5 |
| Debian | Debian Linux | 9.0 |
Related Weaknesses (CWE)
References
- https://www.debian.org/security/2018/dsa-4191Third Party Advisory
- https://www.redmine.org/issues/24416Permissions RequiredVendor Advisory
- https://www.redmine.org/projects/redmine/wiki/Security_AdvisoriesPatchVendor Advisory
- https://www.debian.org/security/2018/dsa-4191Third Party Advisory
- https://www.redmine.org/issues/24416Permissions RequiredVendor Advisory
- https://www.redmine.org/projects/redmine/wiki/Security_AdvisoriesPatchVendor Advisory
FAQ
What is CVE-2017-15572?
CVE-2017-15572 is a vulnerability with a CVSS score of 7.5 (HIGH). In Redmine before 3.2.6 and 3.3.x before 3.3.3, remote attackers can obtain sensitive information (password reset tokens) by reading a Referer log, because account/lost_password does not use a redirec...
How severe is CVE-2017-15572?
CVE-2017-15572 has been rated HIGH with a CVSS base score of 7.5/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2017-15572?
Check the references section above for vendor advisories and patch information. Affected products include: Redmine Redmine, Debian Debian Linux.