FusionForge before 5.3.2 use scripts that run under the shared Apache user, which is also used by project homepages by default. If project webpages are hosted on the same server than FusionForge, it can allow users to incorrectly access on-disk private data in FusionForge.
References
Link | Resource |
---|---|
http://lists.fusionforge.org/pipermail/fusionforge-general/2014-September/002824.html | Mailing List Tool Signature |
https://security-tracker.debian.org/tracker/CVE-2014-6275 | Third Party Advisory |
http://lists.fusionforge.org/pipermail/fusionforge-general/2014-September/002824.html | Mailing List Tool Signature |
https://security-tracker.debian.org/tracker/CVE-2014-6275 | Third Party Advisory |
Configurations
History
21 Nov 2024, 02:14
Type | Values Removed | Values Added |
---|---|---|
References | () http://lists.fusionforge.org/pipermail/fusionforge-general/2014-September/002824.html - Mailing List, Tool Signature | |
References | () https://security-tracker.debian.org/tracker/CVE-2014-6275 - Third Party Advisory |
Information
Published : 2020-01-02 22:15
Updated : 2024-11-21 02:14
NVD link : CVE-2014-6275
Mitre link : CVE-2014-6275
CVE.ORG link : CVE-2014-6275
JSON object : View
Products Affected
fusionforge
- fusionforge
debian
- debian_linux
CWE
CWE-200
Exposure of Sensitive Information to an Unauthorized Actor