gitolite commit fa06a34 through 3.5.3 might allow attackers to have unspecified impact via vectors involving world-writable permissions when creating (1) ~/.gitolite.rc, (2) ~/.gitolite, or (3) ~/repositories/gitolite-admin.git on fresh installs.
References
Link | Resource |
---|---|
https://www.securityfocus.com/bid/63237 | Third Party Advisory VDB Entry |
https://www.openwall.com/lists/oss-security/2013/10/21/11 | Mailing List Patch |
https://groups.google.com/forum/#!topic/gitolite/Tu1sjaf7A4A/discussion | Mailing List Third Party Advisory |
https://github.com/sitaramc/gitolite/commit/3dad4f8e3214d6ab5f71823019a624fa48b055a3 | Patch Third Party Advisory |
Configurations
Information
Published : 2018-09-21 10:29
Updated : 2018-11-19 12:40
NVD link : CVE-2013-4451
Mitre link : CVE-2013-4451
JSON object : View
CWE
CWE-264
Permissions, Privileges, and Access Controls
Products Affected
gitolite
- gitolite