Gitblit 1.9.2 allows privilege escalation via the Config User Service: a control character can be placed in a profile data field, such as an emailAddress%3Atext 'attacker@example.com\n\trole = "#admin"' value.
The product does not properly assign, modify, track, or check privileges for an actor, creating an unintended sphere of control for that actor.
Link | Tags |
---|---|
https://github.com/gitblit/gitblit/issues/1410 | issue tracking exploit third party advisory |
https://github.com/gitblit/gitblit/releases/tag/v1.9.3 | third party advisory release notes |