{"id":"CVE-2021-31864","details":"Redmine before 4.0.9, 4.1.x before 4.1.3, and 4.2.x before 4.2.1 allows attackers to bypass the add_issue_notes permission requirement by leveraging the incoming mail handler.","aliases":["BIT-redmine-2021-31864"],"modified":"2026-04-11T12:36:27.342571Z","published":"2021-04-28T07:15:07.610Z","database_specific":{"unresolved_ranges":[{"extracted_events":[{"last_affected":"9.0"}],"source":"CPE_FIELD","cpe":"cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*"}]},"references":[{"type":"ADVISORY","url":"https://lists.debian.org/debian-lts-announce/2021/05/msg00013.html"},{"type":"ADVISORY","url":"https://www.redmine.org/news/131"},{"type":"ADVISORY","url":"https://www.redmine.org/projects/redmine/wiki/Security_Advisories"}],"affected":[{"ranges":[{"type":"GIT","repo":"https://github.com/redmine/redmine","events":[{"introduced":"0"},{"fixed":"ffaff01ccf0548c22f2e24486162988e4eda8575"},{"introduced":"f5e62c8b125a09b2b66192125708d1aea492353c"},{"fixed":"d1b7905ca9af8075542dad8c0fd671c6c82fd32f"},{"introduced":"47d3615a0b2a1d8c9db3d90a0c836e1d24f036a6"},{"fixed":"5b4b548b385db35c5546a98774b19b3f559e13c2"}],"database_specific":{"extracted_events":[{"introduced":"0"},{"fixed":"4.0.9"},{"introduced":"4.1.0"},{"fixed":"4.1.3"},{"introduced":"4.2.0"},{"fixed":"4.2.1"}],"source":"CPE_FIELD","cpe":"cpe:2.3:a:redmine:redmine:*:*:*:*:*:*:*:*"}}],"database_specific":{"source":"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2021-31864.json"}}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N"}]}