Fossil before 2.10.2, 2.11.x before 2.11.2, and 2.12.x before 2.12.1 allows remote authenticated users to execute arbitrary code. An attacker must have check-in privileges on the repository.
The product does not perform an authorization check when an actor attempts to access a resource or perform an action.
Link | Tags |
---|---|
https://www.openwall.com/lists/oss-security/2020/08/20/1 | third party advisory mailing list |
https://fossil-scm.org/forum/info/a05ae3ce7760daf6 | vendor advisory |
http://www.openwall.com/lists/oss-security/2020/08/25/1 | third party advisory mailing list |
https://fossil-scm.org/fossil/vdiff?branch=sec2020-2.12-patch&diff=1&w | third party advisory |
http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00065.html | vendor advisory mailing list third party advisory |
https://security.gentoo.org/glsa/202011-04 | third party advisory vendor advisory |
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ARYF4YMYXCANXUDS3B3CA4JGUZNUJOJA/ | vendor advisory |
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/GVZK4K7SFBQRCGCHS76HW2LTSEH2KSUM/ | vendor advisory |