CVE-2021-37156:Redmine 4.2.0 and 4.2.1 session persistence vulnerability when enabling two-factor authentication

splash
Back

Description Preview

In Redmine versions 4.2.0 and 4.2.1, there is a security vulnerability (CWE-613: Insufficient Session Expiration) where existing user sessions remain active after two-factor authentication (2FA) is enabled for a user account. The intended security behavior is that all existing sessions should be terminated when 2FA is enabled, forcing users to re-authenticate with the new 2FA requirements. This vulnerability could allow unauthorized access to user accounts if an attacker has gained access to an existing session before 2FA was enabled.

Overview

This vulnerability affects Redmine project management web application versions 4.2.0 and 4.2.1. The issue occurs in the session management functionality related to two-factor authentication implementation. When a user enables two-factor authentication for their account, any existing sessions for that user continue to remain active instead of being terminated. This creates a security gap where sessions that were established before the stronger authentication requirement was implemented can still access the account, effectively bypassing the added security measure. An attacker who has gained unauthorized access to a user's session could continue to maintain access even after the legitimate user enables 2FA protection.

Remediation

Organizations should upgrade to a patched version of Redmine as recommended by the vendor. The vulnerability has been addressed in subsequent releases. If immediate upgrading is not possible, administrators should consider the following temporary mitigations:

  • Manually terminate all active sessions after enabling 2FA for any user account
  • Monitor user sessions closely for any suspicious activity
  • Implement additional network-level security controls to restrict access to the Redmine instance
  • Educate users about the importance of using secure and private devices when accessing Redmine

For users enabling 2FA, it is recommended to log out of all sessions on all devices immediately after enabling 2FA to ensure no unauthorized sessions remain active.

References

  • Redmine Release Notes and Security Advisory: https://www.redmine.org/news/132
  • Redmine Security Advisories Page: https://www.redmine.org/projects/redmine/wiki/Security_Advisories
  • CWE-613: Insufficient Session Expiration: https://cwe.mitre.org/data/definitions/613.html

Industry ExposureMost to least
This section illustrates the prevalence of a specific Common Vulnerabilities and Exposures (CVE) across various industries based on customer reports. The ranking displays industries from the most to least affected by this particular vulnerability, offering valuable insight into where this CVE has been most frequently observed. This information can help organizations within these sectors prioritize their security efforts, understand their relative risk exposure compared to their peers, and focus remediation strategies where they are most needed. By understanding the industry-specific impact, organizations can make more informed decisions regarding patching, resource allocation, and overall risk management related to this CVE.

  1. Accommodation & Food Services
    Accommodation & Food Services
  2. Administrative, Support, Waste Management & Remediation Services
    Administrative, Support, Waste Management & Remediation Services
  3. Agriculture, Forestry Fishing & Hunting
    Agriculture, Forestry Fishing & Hunting
  4. Arts, Entertainment & Recreation
    Arts, Entertainment & Recreation
  5. Construction
    Construction
  6. Educational Services
    Educational Services
  7. Finance and Insurance
    Finance and Insurance
  8. Health Care & Social Assistance
    Health Care & Social Assistance
  9. Information
    Information
  10. Management of Companies & Enterprises
    Management of Companies & Enterprises
  11. Manufacturing
    Manufacturing
  12. Mining
    Mining
  13. Other Services (except Public Administration)
    Other Services (except Public Administration)
  14. Professional, Scientific, & Technical Services
    Professional, Scientific, & Technical Services
  15. Public Administration
    Public Administration
  16. Real Estate Rental & Leasing
    Real Estate Rental & Leasing
  17. Retail Trade
    Retail Trade
  18. Transportation & Warehousing
    Transportation & Warehousing
  19. Utilities
    Utilities
  20. Wholesale Trade
    Wholesale Trade

Focus on What Matters

  1. See Everything.
  2. Identify True Risk.
  3. Proactively Mitigate Threats.

Let's talk!

background
Armis Vulnerability Intelligence Database