Redmine Security Test Results

Site: www.redmine.org

F

  • It looks like your Redmine is vulnerable to hacker attacks with severe impact on your Redmine data.
  • It appears that you are running Redmine 2.5.1 which is an old release that has not been updated for over 10 years.
  • Your Redmine is protected by TLS/SSL but it is also accessible via an unencrypted connection.
  • Your server configuration is missing some security relevant headers.

What now?

  • We strongly recommend you update your Redmine to the latest version.
  • You should also disable unencrypted access via plain HTTP.

Get Free Redmine Security Monitoring:

You will receive an email when the rating for www.redmine.org changes or when a new Redmine version is released. This service is free. No spam, guaranteed.
Not enough time to keep Redmine secure?
Move to Professionally Hosted Redmine by Planio.

Detailed Analysis

General Server Test

TLS/SSL enabled
TLS/SSL encrypts your server's HTTP traffic and prevents attackers from eavesdropping on connections to and from your Redmine server.
TLS/SSL certificate is valid and trusted
Using a valid and trusted certificate prevents error messages in your user's browsers and makes sure that the connection has not been intercepted by attackers.
Not redirecting to TLS/SSL
Your Redmine is protected by TLS/SSL but it is also accessible via an unencrypted connection. Without TLS/SSL, attackers in the same (wireless) network as your users can easily intercept all traffic and steal your user's passwords. To avoid such attacks, the server should be configured to redirect unprotected access to TLS/SSL.
HTTP Strict Transport Security header not set
A properly configured Strict Transport Security header instructs your user's browser to automatically access your Redmine using an encrypted connection. This would further reduce the risk of man-in-the-middle and phishing attacks in shared (wireless) networks.
X-Frame-Options header not set
Your Redmine server does not send an X-Frame-Options header and therefore exposes your users to Clickjacking attacks.
Failed
Failed Html
X-Content-Type-Options header not set
Content sniffing may enable cross-site scripting attacks. Since your Redmine server is not properly sending the X-Content-Type-Options header, your users are vulnerable to this attack vector.

How this works

Redmine Security Scanner tries to determine the version of your Redmine installation and it will list all known security vulnerabilities for that version. In addition, it will check your server configuration and make sure everything is set up securely.

Based on the results of these checks, Redmine Security Scanner will assign one of the following grades:

A+
Your Redmine installation is up to date, protected by properly configured TLS/SSL, not accessible via an unencrypted connection and all security relevant server headers are configured properly. Well done!
A
Your Redmine installation is up to date, protected by properly configured TLS/SSL and not accessible via an unencrypted connection. However you are missing some security relevant server headers which we recommend to further harden your server.
B
Your Redmine installation is up to date, protected by SSL but you are using a self-signed or untrusted certificate. This may lead to security warnings in your browser. Attackers may use this for phishing attacks and steal your user's passwords.
C
Your Redmine installation is up to date, but it's accessible via an unencrypted plain text HTTP connection. Attackers in the same (wireless) network as your users can easily intercept all traffic and steal your user's passwords. Servers with enabled TLS/SSL will get the same rating if unencrypted access is possible as well.
D
Your Redmine installation is too old and is vulnerable to at least one security issue of low severity.
E
Your Redmine installation is too old and is vulnerable to at least one security issue of moderate severity.
F
Your Redmine installation is too old and is vulnerable to at least one security issue of critical or high severity.
Disclaimer and terms of use

Redmine Security Scanner is a free community service provided by the Redmine professionals at Planio. You are only allowed to use this service to scan your own Redmine installation.

All checks are performed using black box testing, that means Redmine Security Scanner will only collect information about your Redmine server that is publicly accessible. It will not attempt to login or access any privileged information.

If your Redmine code has been modified or deviates from the standard releases available on the Redmine website, Redmine Security Scanner may occasionally detect a wrong version or display vulnerabilities which are not present or exploitable on your Redmine server. It might also claim that your Redmine server isn't vulnerable to any known vulnerabilities when it actually is. In some cases, Redmine Security Scanner will not be able to detect a Redmine version with 100% certainty. A version range and the associated vulnerabilities will be shown in this case.

Redmine Security Scanner was built and tested with meticulous care and to the best of our knowledge, but Planio GmbH does not give any guarantees as to the correctness of the information displayed. Planio GmbH cannot be held liable for the correctness of the results of Redmine Security Scanner. The security of your Redmine server is your own responsibility. We also provide professional Redmine hosting should you wish to focus on your core business instead of your Redmine server.

If you believe that Redmine Security Scanner shows wrong results for your server, please get in touch and we will be happy to see if we can improve it.

Target Started Duration
https://www.redmine.org/ March 13, 2019 09:43 2.57s