gitolite commit fa06a34 through 3.5.3 might allow attackers to have unspecified impact via vectors involving world-writable permissions when creating (1) ~/.gitolite.rc, (2) ~/.gitolite, or (3) ~/repositories/gitolite-admin.git on fresh installs.
References
Link | Resource |
---|---|
https://github.com/sitaramc/gitolite/commit/3dad4f8e3214d6ab5f71823019a624fa48b055a3 | Patch Third Party Advisory |
https://groups.google.com/forum/#%21topic/gitolite/Tu1sjaf7A4A/discussion | |
https://www.openwall.com/lists/oss-security/2013/10/21/11 | Mailing List Patch |
https://www.securityfocus.com/bid/63237 | Third Party Advisory VDB Entry |
Configurations
History
07 Nov 2023, 02:16
Type | Values Removed | Values Added |
---|---|---|
References |
|
|
Information
Published : 2018-09-21 17:29
Updated : 2024-02-28 16:48
NVD link : CVE-2013-4451
Mitre link : CVE-2013-4451
CVE.ORG link : CVE-2013-4451
JSON object : View
Products Affected
gitolite
- gitolite
CWE
CWE-264
Permissions, Privileges, and Access Controls