First published: Fri Aug 09 2013(Updated: )
Directory traversal vulnerability in the cgit_parse_readme function in ui-summary.c in cgit before 0.9.2, when a readme file is set to a filesystem path, allows remote attackers to read arbitrary files via a .. (dot dot) in the url parameter.
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
Jason A Donenfeld Cgit | <=0.9.1 | |
Lars Hjemli Cgit | =0.1 | |
Lars Hjemli Cgit | =0.2 | |
Lars Hjemli Cgit | =0.3 | |
Lars Hjemli Cgit | =0.4 | |
Lars Hjemli Cgit | =0.5 | |
Lars Hjemli Cgit | =0.6 | |
Lars Hjemli Cgit | =0.6.1 | |
Lars Hjemli Cgit | =0.6.2 | |
Lars Hjemli Cgit | =0.6.3 | |
Lars Hjemli Cgit | =0.7 | |
Lars Hjemli Cgit | =0.7.1 | |
Lars Hjemli Cgit | =0.7.2 | |
Lars Hjemli Cgit | =0.8 | |
Lars Hjemli Cgit | =0.8.1 | |
Lars Hjemli Cgit | =0.8.1.1 | |
Lars Hjemli Cgit | =0.8.2 | |
Lars Hjemli Cgit | =0.8.2.1 | |
Lars Hjemli Cgit | =0.8.2.2 | |
Lars Hjemli Cgit | =0.8.3 | |
Lars Hjemli Cgit | =0.8.3.1 | |
Lars Hjemli Cgit | =0.8.3.2 | |
Lars Hjemli Cgit | =0.8.3.3 | |
Lars Hjemli Cgit | =0.8.3.4 | |
Lars Hjemli Cgit | =0.8.3.5 | |
Lars Hjemli Cgit | =0.9 | |
Lars Hjemli Cgit | =0.9.0.1 | |
Lars Hjemli Cgit | =0.9.0.2 | |
Lars Hjemli Cgit | =0.9.0.3 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.