The write_array_file function in utils/include.pl in GForge 4.5.14 updates configuration files by truncating them to zero length and then writing new data, which might allow attackers to bypass intended access restrictions or have unspecified other impact in opportunistic circumstances.
                
            References
                    Configurations
                    Configuration 1 (hide)
| AND | 
 
 | 
History
                    21 Nov 2024, 00:41
| Type | Values Removed | Values Added | 
|---|---|---|
| References | () http://secunia.com/advisories/30088 - Vendor Advisory | |
| References | () http://secunia.com/advisories/30286 - Vendor Advisory | |
| References | () http://security.debian.org/pool/updates/main/g/gforge/gforge_4.5.14-22etch8.diff.gz - | |
| References | () http://www.debian.org/security/2008/dsa-1577 - Patch | |
| References | () http://www.securityfocus.com/bid/29215 - | |
| References | () http://www.vupen.com/english/advisories/2008/1537/references - | |
| References | () https://exchange.xforce.ibmcloud.com/vulnerabilities/42456 - | 
Information
                Published : 2008-05-18 14:20
Updated : 2025-04-09 00:30
NVD link : CVE-2008-0167
Mitre link : CVE-2008-0167
CVE.ORG link : CVE-2008-0167
JSON object : View
Products Affected
                gforge
- gforge
debian
- debian_linux
CWE
                
                    
                        
                        CWE-59
                        
            Improper Link Resolution Before File Access ('Link Following')
