ViewVC before 1.0.5 provides revision metadata without properly checking whether access was intended, which allows remote attackers to obtain sensitive information by reading (1) forbidden pathnames in the revision view, (2) log history that can only be reached by traversing a forbidden object, or (3) forbidden diff view path parameters.
The product exposes sensitive information to an actor that is not explicitly authorized to have access to that information.
Link | Tags |
---|---|
http://security.gentoo.org/glsa/glsa-200803-29.xml | vendor advisory |
http://secunia.com/advisories/29460 | third party advisory vendor advisory |
http://secunia.com/advisories/29176 | third party advisory vendor advisory |
http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=471380 | |
http://www.vupen.com/english/advisories/2008/0734/references | vdb entry |
http://www.securityfocus.com/bid/28055 | vdb entry patch |
http://bugs.gentoo.org/show_bug.cgi?id=212288 | |
http://viewvc.tigris.org/source/browse/viewvc/trunk/CHANGES?rev=HEAD |