First published: Thu Jan 10 2019(Updated: )
commands/rsync in Gitolite before 3.6.11, if .gitolite.rc enables rsync, mishandles the rsync command line, which allows attackers to have a "bad" impact by triggering use of an option other than -v, -n, -q, or -P.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Gitolite | <3.6.11 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2018-20683 has a medium severity rating due to potential exploitation through mishandled command line options in Gitolite.
To fix CVE-2018-20683, upgrade Gitolite to version 3.6.11 or later, where the vulnerability has been addressed.
CVE-2018-20683 affects Gitolite versions prior to 3.6.11 that have rsync enabled in their configuration.
Exploiting CVE-2018-20683 may allow attackers to execute undesirable command options, potentially compromising system security.
CVE-2018-20683 can be exploited remotely if rsync is enabled, allowing an attacker to manipulate command line execution.