First published: Thu Nov 07 2019(Updated: )
gitolite before 1.4.1 does not filter src/ or hooks/ from path names.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
debian/gitolite | ||
Gitolite | <1.4.1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2010-2447 is considered a security vulnerability that allows unauthorized access due to improper path filtering.
To fix CVE-2010-2447, upgrade to Gitolite version 1.4.1 or later.
CVE-2010-2447 allows attackers to potentially access sensitive files through symlink attacks.
Gitolite versions before 1.4.1 are affected by CVE-2010-2447.
Yes, CVE-2010-2447 can be exploited remotely if an attacker has access to the Gitolite repository.