First published: Mon Mar 24 2008(Updated: )
ViewVC before 1.0.5 provides revision metadata without properly checking whether access was intended, which allows remote attackers to obtain sensitive information by reading (1) forbidden pathnames in the revision view, (2) log history that can only be reached by traversing a forbidden object, or (3) forbidden diff view path parameters.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Gentoo Linux | ||
Red Hat Fedora | =7 | |
Red Hat Fedora | =8 | |
ViewVC | =1.0.2 | |
ViewVC | =1.0.3 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2008-1292 is considered a high-severity vulnerability due to its potential to expose sensitive repository information.
To fix CVE-2008-1292, upgrade ViewVC to version 1.0.5 or later to ensure proper access controls are in place.
CVE-2008-1292 affects ViewVC versions 1.0.2 and 1.0.3.
CVE-2008-1292 can expose forbidden pathnames and log history that should not be accessible.
While CVE-2008-1292 primarily affects ViewVC software, it has been reported in conjunction with various operating systems, including Fedora.