First published: Tue Apr 12 2011(Updated: )
A flaw was found in the gitolite ADC (Admin Defined Commands) system [1]. If the ADC feature were enabled, a remote user could connect to gitolite and execute arbitrary commands by specifying a command such as "../../../../usr/bin/foo" because gitolite did not filter command names. This has been corrected upstream [2] in version 1.5.9.1 and gitolite will now refuse to execute any commands with ".." in the supplied command name. Note that ADC is only enabled when GL_ADC_PATH is set in the rc file (it is not enabled or set by default) and both the documentation and example rc file note that there are security risks involved with using ADC. [1] <a href="http://groups.google.com/group/gitolite/browse_thread/thread/797a93ec26e1dcbc?pli=1">http://groups.google.com/group/gitolite/browse_thread/thread/797a93ec26e1dcbc?pli=1</a> [2] <a href="https://github.com/sitaramc/gitolite/commit/4ce00aef84d1ff7c35f7adbbb99a6241cfda00cc">https://github.com/sitaramc/gitolite/commit/4ce00aef84d1ff7c35f7adbbb99a6241cfda00cc</a>
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
Gitolite | <=1.5.9 | |
Gitolite | =0.50 | |
Gitolite | =0.55 | |
Gitolite | =0.60 | |
Gitolite | =0.65 | |
Gitolite | =0.70 | |
Gitolite | =0.80 | |
Gitolite | =0.85 | |
Gitolite | =0.90 | |
Gitolite | =0.95 | |
Gitolite | =1.0 | |
Gitolite | =1.0-rc1 | |
Gitolite | =1.1 | |
Gitolite | =1.2 | |
Gitolite | =1.3 | |
Gitolite | =1.4 | |
Gitolite | =1.4.1 | |
Gitolite | =1.4.2 | |
Gitolite | =1.5 | |
Gitolite | =1.5.1 | |
Gitolite | =1.5.2 | |
Gitolite | =1.5.3 | |
Gitolite | =1.5.4 | |
Gitolite | =1.5.5 | |
Gitolite | =1.5.6 | |
Gitolite | =1.5.7 | |
Gitolite | =1.5.8 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2011-1572 is considered a high-severity vulnerability due to the potential for remote code execution.
To fix CVE-2011-1572, update Gitolite to the latest version that does not contain this flaw.
CVE-2011-1572 affects Gitolite versions up to and including 1.5.9 and several specific versions from 0.50 to 1.5.8.
CVE-2011-1572 is classified as a command injection vulnerability that allows remote execution of arbitrary commands.
Any remote user with access to the Gitolite server can exploit CVE-2011-1572 if the Admin Defined Commands feature is enabled.