[Forgot Password]
Login  Register Subscribe

30479

 
 

423868

 
 

248364

 
 

909

 
 

195388

 
 

282

Paid content will be excluded from the download.


Download | Alert*
CVE
view JSON

CVE-2012-4506Date: (C)2012-10-23   (M)2023-12-22


Directory traversal vulnerability in gitolite 3.x before 3.1, when wild card repositories and a pattern matching "../" are enabled, allows remote authenticated users to create arbitrary repositories and possibly perform other actions via a .. (dot dot) in a repository name.

CVSS Score and Metrics +CVSS Score and Metrics -

CVSS V2 Severity:
CVSS Score : 4.6
Exploit Score: 3.9
Impact Score: 6.4
 
CVSS V2 Metrics:
Access Vector: NETWORK
Access Complexity: HIGH
Authentication: SINGLE
Confidentiality: PARTIAL
Integrity: PARTIAL
Availability: PARTIAL
  
Reference:
SECUNIA-50896
BID-55853
http://www.openwall.com/lists/oss-security/2012/10/10/1
http://www.openwall.com/lists/oss-security/2012/10/10/2
gitolite-security-bypass(79130)
https://github.com/sitaramc/gitolite/commit/f636ce3ba3e340569b26d1e47b9d9b62dd8a3bf2
https://groups.google.com/forum/#%21topic/gitolite/K9SnQNhCQ-0/discussion

CPE    2
cpe:/a:sitaram_chamarty:gitolite:3.01
cpe:/a:gitolite:gitolite:3.0
CWE    1
CWE-22

© SecPod Technologies