First published: Mon Jan 12 2009(Updated: )
Sebastian Krahmer of the SuSE security team discovered a remote command injection flaws in the gitweb, caused by an insufficient checking of the inputs used to build argument to perl's open() function. Remote attacker could use these flaws to run arbitrary commands with the privileges of the web server executing gitweb CGI scripts. Issues are already fixed upstream in the latest git branches. It seems that the security consequences were not noticed when fixes were applied upstream, as multiple occurrences of the similar flaws were fixed in different upstream versions: <a href="https://access.redhat.com/security/cve/CVE-2008-5517">CVE-2008-5517</a> <a href="http://repo.or.cz/w/git.git?a=commitdiff;h=516381d5">http://repo.or.cz/w/git.git?a=commitdiff;h=516381d5</a> (fixes issues in git_snapshot and git_object, first occurred in 1.5.6) <a href="https://access.redhat.com/security/cve/CVE-2008-5516">CVE-2008-5516</a> <a href="http://repo.or.cz/w/git.git?a=commitdiff;h=c582abae">http://repo.or.cz/w/git.git?a=commitdiff;h=c582abae</a> (fixes issue in git_search, first occurred in 1.5.5) All current Fedora packages use version 1.5.6+, so neither of the issue apply to them. EPEL versions should be affected by one or both of the issues.
Affected Software | Affected Version | How to fix |
---|---|---|
Git | >=1.5.5>=1.5.6 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of REDHAT-BUG-479715 is classified as critical due to the potential for remote command injection.
To fix REDHAT-BUG-479715, update the git package to the latest version that addresses this vulnerability.
REDHAT-BUG-479715 affects Git versions from 1.5.5 to 1.5.6 inclusive.
REDHAT-BUG-479715 is a remote command injection vulnerability.
Yes, an attacker can exploit REDHAT-BUG-479715 remotely if the affected Git web service is accessible.