Gitolite before 3.6.9 does not (in certain configurations involving @all or a regex) properly restrict access to a Git repository that is in the process of being migrated until the full set of migration steps has been completed. This can allow valid users to obtain unintended access.
References
Link | Resource |
---|---|
https://groups.google.com/forum/#!topic/gitolite-announce/WrwDTYdbfRg | Mailing List Third Party Advisory |
https://github.com/sitaramc/gitolite/commit/dc13dfca8fdae5634bb0865f7e9822d2a268ed59 | Patch Third Party Advisory |
https://bugs.debian.org/908699 | Mailing List Patch Third Party Advisory |
Configurations
Information
Published : 2018-09-12 15:29
Updated : 2019-10-02 17:03
NVD link : CVE-2018-16976
Mitre link : CVE-2018-16976
JSON object : View
CWE
CWE-362
Concurrent Execution using Shared Resource with Improper Synchronization ('Race Condition')
Products Affected
gitolite
- gitolite