cgit_clone_objects in CGit before 1.2.1 has a directory traversal vulnerability when `enable-http-clone=1` is not turned off, as demonstrated by a cgit/cgit.cgi/git/objects/?path=../ request.
The product uses external input to construct a pathname that is intended to identify a file or directory that is located underneath a restricted parent directory, but the product does not properly neutralize special elements within the pathname that can cause the pathname to resolve to a location that is outside of the restricted directory.
Link | Tags |
---|---|
https://lists.debian.org/debian-lts-announce/2018/08/msg00005.html | third party advisory mailing list |
https://www.exploit-db.com/exploits/45195/ | exploit vdb entry third party advisory |
https://www.debian.org/security/2018/dsa-4263 | third party advisory vendor advisory |
https://bugs.chromium.org/p/project-zero/issues/detail?id=1627 | issue tracking exploit third party advisory |
https://lists.zx2c4.com/pipermail/cgit/2018-August/004176.html | vendor advisory |