CVE-2024-36267

8.1 HIGH

📋 TL;DR

A path traversal vulnerability in Redmine DMSF Plugin allows authenticated users to access or delete arbitrary files on the server within the Redmine process's privileges. This affects all Redmine installations using DMSF Plugin versions before 3.1.4. Attackers can potentially read sensitive configuration files or delete critical system files.

💻 Affected Systems

Products:
  • Redmine DMSF Plugin
Versions: All versions prior to 3.1.4
Operating Systems: All operating systems running Redmine
Default Config Vulnerable: ⚠️ Yes
Notes: Requires Redmine installation with DMSF Plugin enabled. User must be logged in to exploit.

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete server compromise through reading sensitive files (like SSH keys, database credentials) or deleting critical system files causing service disruption.

🟠

Likely Case

Unauthorized access to sensitive project documents, configuration files, or user data stored on the server.

🟢

If Mitigated

Limited impact if file permissions restrict Redmine process access and proper access controls are enforced.

🌐 Internet-Facing: HIGH - Any internet-accessible Redmine instance with vulnerable plugin is exposed to authenticated attackers.
🏢 Internal Only: HIGH - Internal attackers with valid credentials can exploit this vulnerability.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: LOW - Simple path traversal manipulation required.

Exploitation requires authenticated access. No public exploit code identified at time of analysis.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 3.1.4

Vendor Advisory: https://github.com/danmunn/redmine_dmsf

Restart Required: Yes

Instructions:

1. Backup current DMSF Plugin configuration and data. 2. Update plugin via Redmine admin interface or manually install version 3.1.4. 3. Restart Redmine application server. 4. Verify plugin version shows 3.1.4 in Redmine admin panel.

🔧 Temporary Workarounds

Disable DMSF Plugin

all

Temporarily disable the vulnerable plugin until patching is possible.

Navigate to Redmine Admin > Plugins > Disable DMSF Plugin

Restrict File System Access

linux

Configure Redmine process to run with minimal file system permissions.

chmod 750 /path/to/redmine/files
setfacl -m u:redmineuser:rx /allowed/paths

🧯 If You Can't Patch

  • Implement strict access controls and monitor for suspicious file access patterns.
  • Isolate Redmine server network segment and restrict user access to minimum required privileges.

🔍 How to Verify

Check if Vulnerable:

Check DMSF Plugin version in Redmine Admin > Plugins. If version is below 3.1.4, system is vulnerable.

Check Version:

Check Redmine admin interface or plugin directory for version file.

Verify Fix Applied:

Confirm DMSF Plugin version shows 3.1.4 in Redmine admin panel and test file access functionality.

📡 Detection & Monitoring

Log Indicators:

  • Unusual file access patterns in Redmine logs
  • Multiple failed file access attempts with path traversal patterns

Network Indicators:

  • Unusual file download patterns from authenticated users

SIEM Query:

source="redmine.log" AND ("../" OR "/etc/" OR "/root/") AND action="download" OR action="delete"

🔗 References

📤 Share & Export