The write_array_file function in utils/include.pl in GForge 4.5.14 updates configuration files by truncating them to zero length and then writing new data, which might allow attackers to bypass intended access restrictions or have unspecified other impact in opportunistic circumstances.
References
Configurations
Configuration 1 (hide)
AND |
|
History
21 Nov 2024, 00:41
Type | Values Removed | Values Added |
---|---|---|
References | () http://secunia.com/advisories/30088 - Vendor Advisory | |
References | () http://secunia.com/advisories/30286 - Vendor Advisory | |
References | () http://security.debian.org/pool/updates/main/g/gforge/gforge_4.5.14-22etch8.diff.gz - | |
References | () http://www.debian.org/security/2008/dsa-1577 - Patch | |
References | () http://www.securityfocus.com/bid/29215 - | |
References | () http://www.vupen.com/english/advisories/2008/1537/references - | |
References | () https://exchange.xforce.ibmcloud.com/vulnerabilities/42456 - |
Information
Published : 2008-05-18 14:20
Updated : 2024-11-21 00:41
NVD link : CVE-2008-0167
Mitre link : CVE-2008-0167
CVE.ORG link : CVE-2008-0167
JSON object : View
Products Affected
debian
- debian_linux
gforge
- gforge
CWE
CWE-59
Improper Link Resolution Before File Access ('Link Following')