First published: Thu Mar 08 2018(Updated: )
Mercurial version 4.5 and earlier contains a Incorrect Access Control (CWE-285) vulnerability in Protocol server that can result in Unauthorized data access. This attack appear to be exploitable via network connectivity. This vulnerability appears to have been fixed in 4.5.1.
Credit: cve@mitre.org cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Mercurial Mercurial | <4.5.1 | |
Debian Debian Linux | =7.0 | |
Debian Debian Linux | =8.0 | |
redhat/mercurial | <4.5.2 | 4.5.2 |
pip/mercurial | <4.5.1 | 4.5.1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2018-1000132 is a vulnerability in Mercurial version 4.5 and earlier that allows unauthorized data access through the protocol server.
CVE-2018-1000132 has a severity rating of 9.1 (critical).
CVE-2018-1000132 can be exploited through network connectivity.
CVE-2018-1000132 has been fixed in version 4.5.1 of Mercurial, so updating to 4.5.1 or later will resolve the vulnerability.
You can find more information about CVE-2018-1000132 at the following references: [Link 1](https://access.redhat.com/errata/RHSA-2019:2276), [Link 2](https://lists.debian.org/debian-lts-announce/2018/03/msg00034.html), [Link 3](https://lists.debian.org/debian-lts-announce/2018/07/msg00005.html).