FusionForge before 5.3.2 use scripts that run under the shared Apache user, which is also used by project homepages by default. If project webpages are hosted on the same server than FusionForge, it can allow users to incorrectly access on-disk private data in FusionForge.
References
Link | Resource |
---|---|
http://lists.fusionforge.org/pipermail/fusionforge-general/2014-September/002824.html | Mailing List Tool Signature |
https://security-tracker.debian.org/tracker/CVE-2014-6275 | Third Party Advisory |
Information
Published : 2020-01-02 14:15
Updated : 2020-01-14 09:38
NVD link : CVE-2014-6275
Mitre link : CVE-2014-6275
JSON object : View
CWE
CWE-200
Exposure of Sensitive Information to an Unauthorized Actor
Products Affected
debian
- debian_linux
fusionforge
- fusionforge