CVE-2013-4451

gitolite commit fa06a34 through 3.5.3 might allow attackers to have unspecified impact via vectors involving world-writable permissions when creating (1) ~/.gitolite.rc, (2) ~/.gitolite, or (3) ~/repositories/gitolite-admin.git on fresh installs.
Configurations

Configuration 1 (hide)

cpe:2.3:a:gitolite:gitolite:*:*:*:*:*:*:*:*

History

21 Nov 2024, 01:55

Type Values Removed Values Added
References () https://github.com/sitaramc/gitolite/commit/3dad4f8e3214d6ab5f71823019a624fa48b055a3 - Patch, Third Party Advisory () https://github.com/sitaramc/gitolite/commit/3dad4f8e3214d6ab5f71823019a624fa48b055a3 - Patch, Third Party Advisory
References () https://groups.google.com/forum/#%21topic/gitolite/Tu1sjaf7A4A/discussion - () https://groups.google.com/forum/#%21topic/gitolite/Tu1sjaf7A4A/discussion -
References () https://www.openwall.com/lists/oss-security/2013/10/21/11 - Mailing List, Patch () https://www.openwall.com/lists/oss-security/2013/10/21/11 - Mailing List, Patch
References () https://www.securityfocus.com/bid/63237 - Third Party Advisory, VDB Entry () https://www.securityfocus.com/bid/63237 - Third Party Advisory, VDB Entry

07 Nov 2023, 02:16

Type Values Removed Values Added
References
  • {'url': 'https://groups.google.com/forum/#!topic/gitolite/Tu1sjaf7A4A/discussion', 'name': 'https://groups.google.com/forum/#!topic/gitolite/Tu1sjaf7A4A/discussion', 'tags': ['Mailing List', 'Third Party Advisory'], 'refsource': 'CONFIRM'}
  • () https://groups.google.com/forum/#%21topic/gitolite/Tu1sjaf7A4A/discussion -

Information

Published : 2018-09-21 17:29

Updated : 2024-11-21 01:55


NVD link : CVE-2013-4451

Mitre link : CVE-2013-4451

CVE.ORG link : CVE-2013-4451


JSON object : View

Products Affected

gitolite

  • gitolite
CWE
CWE-264

Permissions, Privileges, and Access Controls