FusionForge before 5.3.2 use scripts that run under the shared Apache user, which is also used by project homepages by default. If project webpages are hosted on the same server than FusionForge, it can allow users to incorrectly access on-disk private data in FusionForge.
The product exposes sensitive information to an actor that is not explicitly authorized to have access to that information.
Link | Tags |
---|---|
https://security-tracker.debian.org/tracker/CVE-2014-6275 | third party advisory |
http://lists.fusionforge.org/pipermail/fusionforge-general/2014-September/002824.html | tool signature mailing list |