Gitolite before 3.6.9 does not (in certain configurations involving @all or a regex) properly restrict access to a Git repository that is in the process of being migrated until the full set of migration steps has been completed. This can allow valid users to obtain unintended access.
References
Link | Resource |
---|---|
https://bugs.debian.org/908699 | Mailing List Patch Third Party Advisory |
https://github.com/sitaramc/gitolite/commit/dc13dfca8fdae5634bb0865f7e9822d2a268ed59 | Patch Third Party Advisory |
https://groups.google.com/forum/#%21topic/gitolite-announce/WrwDTYdbfRg |
Configurations
History
No history.
Information
Published : 2018-09-12 22:29
Updated : 2024-02-04 20:03
NVD link : CVE-2018-16976
Mitre link : CVE-2018-16976
CVE.ORG link : CVE-2018-16976
JSON object : View
Products Affected
gitolite
- gitolite
CWE
CWE-362
Concurrent Execution using Shared Resource with Improper Synchronization ('Race Condition')