GForge 4.5.14, 4.7 rc2, and 4.8.2 allows local users to overwrite arbitrary files via a symlink attack on authorized_keys files in users' home directories, related to deb-specific/ssh_dump_update.pl and cronjobs/cvs-cron/ssh_create.php.
The product attempts to access a file based on the filename, but it does not properly prevent that filename from identifying a link or shortcut that resolves to an unintended resource.
Link | Tags |
---|---|
http://security.debian.org/pool/updates/main/g/gforge/gforge_4.5.14-22etch13.diff.gz | patch |
http://www.securityfocus.com/bid/37195 | vdb entry patch |
http://www.debian.org/security/2009/dsa-1945 | patch vendor advisory |