Uploaded image for project: 'FishEye'
  1. FishEye
  2. FE-4965

Privilege escalation

XMLWordPrintable

      We have identified and fixed a vulnerability in FishEye which allowed unauthenticated users to commit actions on behalf of any other authorised user. In order to exploit this vulnerability, an attacker requires access to your FishEye web interface.

      FishEye server is only vulnerable if it has been configured to be a part of an Application link with Trusted Applications authentication.

      The vulnerability affects all supported versions of FishEye up to and including 3.1.5. It has been fixed in 3.2.0, 3.1.6 and 2.10.8.

      For more information, see our security advisory.

              Unassigned Unassigned
              rbattaglin Renan Battaglin
              Votes:
              0 Vote for this issue
              Watchers:
              2 Start watching this issue

                Created:
                Updated:
                Resolved: