The write_array_file function in utils/include.pl in GForge 4.5.14 updates configuration files by truncating them to zero length and then writing new data, which might allow attackers to bypass intended access restrictions or have unspecified other impact in opportunistic circumstances.
The product attempts to access a file based on the filename, but it does not properly prevent that filename from identifying a link or shortcut that resolves to an unintended resource.
Link | Tags |
---|---|
http://www.securityfocus.com/bid/29215 | vdb entry |
http://secunia.com/advisories/30286 | third party advisory vendor advisory |
http://security.debian.org/pool/updates/main/g/gforge/gforge_4.5.14-22etch8.diff.gz | |
http://www.vupen.com/english/advisories/2008/1537/references | vdb entry |
http://secunia.com/advisories/30088 | third party advisory vendor advisory |
http://www.debian.org/security/2008/dsa-1577 | patch vendor advisory |
https://exchange.xforce.ibmcloud.com/vulnerabilities/42456 | vdb entry |