gitolite commit fa06a34 through 3.5.3 might allow attackers to have unspecified impact via vectors involving world-writable permissions when creating (1) ~/.gitolite.rc, (2) ~/.gitolite, or (3) ~/repositories/gitolite-admin.git on fresh installs.
References
Link | Resource |
---|---|
https://github.com/sitaramc/gitolite/commit/3dad4f8e3214d6ab5f71823019a624fa48b055a3 | Patch Third Party Advisory |
https://groups.google.com/forum/#%21topic/gitolite/Tu1sjaf7A4A/discussion | |
https://www.openwall.com/lists/oss-security/2013/10/21/11 | Mailing List Patch |
https://www.securityfocus.com/bid/63237 | Third Party Advisory VDB Entry |
Configurations
History
No history.
Information
Published : 2018-09-21 17:29
Updated : 2024-02-04 20:03
NVD link : CVE-2013-4451
Mitre link : CVE-2013-4451
CVE.ORG link : CVE-2013-4451
JSON object : View
Products Affected
gitolite
- gitolite
CWE
CWE-264
Permissions, Privileges, and Access Controls