First published: Fri Sep 21 2018(Updated: )
gitolite commit fa06a34 through 3.5.3 might allow attackers to have unspecified impact via vectors involving world-writable permissions when creating (1) ~/.gitolite.rc, (2) ~/.gitolite, or (3) ~/repositories/gitolite-admin.git on fresh installs.
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
Gitolite | >=3.0<=3.5.3 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2013-4451 is considered a moderate severity vulnerability due to potential unauthorized access.
To fix CVE-2013-4451, ensure that the directories and files are not world-writable, particularly ~/.gitolite.rc, ~/.gitolite, and ~/repositories/gitolite-admin.git.
CVE-2013-4451 affects Gitolite versions between 3.0 and 3.5.3.
CVE-2013-4451 could allow attackers to manipulate or gain unauthorized access to repositories due to improper permission settings.
A temporary workaround for CVE-2013-4451 is to manually set correct file permissions on the affected directories and files.