Directory traversal vulnerability in the Admin Defined Commands (ADC) feature in gitolite before 1.5.9.1 allows remote attackers to execute arbitrary commands via .. (dot dot) sequences in admin-defined commands.
The product uses external input to construct a pathname that is intended to identify a file or directory that is located underneath a restricted parent directory, but the product does not properly neutralize special elements within the pathname that can cause the pathname to resolve to a location that is outside of the restricted directory.
Link | Tags |
---|---|
http://groups.google.com/group/gitolite/browse_thread/thread/797a93ec26e1dcbc?pli=1 | |
http://seclists.org/oss-sec/2011/q2/209 | patch mailing list |
https://github.com/sitaramc/gitolite/commit/4ce00aef84d1ff7c35f7adbbb99a6241cfda00cc | patch |
http://www.debian.org/security/2011/dsa-2215 | vendor advisory |
http://seclists.org/oss-sec/2011/q2/197 | patch mailing list |
http://www.securityfocus.com/bid/46473 | patch vdb entry |
https://bugzilla.redhat.com/show_bug.cgi?id=695568 | patch |
https://exchange.xforce.ibmcloud.com/vulnerabilities/65542 | vdb entry |