Debian Security Advisory
DSA-1297-1 gforge-plugin-scmcvs -- missing input sanitising
- Date Reported:
- 24 May 2007
- Affected Packages:
- gforge-plugin-scmcvs
- Vulnerable:
- Yes
- Security database references:
- In Mitre's CVE dictionary: CVE-2007-0246.
- More information:
-
Bernhard R. Link discovered that the CVS browsing interface of Gforge, a collaborative development tool, performs insufficient escaping of URLs, which allows the execution of arbitrary shell commands with the privileges of the www-data user.
The oldstable distribution (sarge) is not affected by this problem.
For the stable distribution (etch) this problem has been fixed in version 4.5.14-5etch1.
For the unstable distribution (sid) this problem has been fixed in version 4.5.14-6.
We recommend that you upgrade your gforge-plugin-scmcvs package.
- Fixed in:
-
Debian GNU/Linux 4.0 (etch)
- Source:
- http://security.debian.org/pool/updates/main/g/gforge-plugin-scmcvs/gforge-plugin-scmcvs_4.5.14-5etch1.dsc
- http://security.debian.org/pool/updates/main/g/gforge-plugin-scmcvs/gforge-plugin-scmcvs_4.5.14-5etch1.tar.gz
- http://security.debian.org/pool/updates/main/g/gforge-plugin-scmcvs/gforge-plugin-scmcvs_4.5.14-5etch1.tar.gz
- Architecture-independent component:
- http://security.debian.org/pool/updates/main/g/gforge-plugin-scmcvs/gforge-plugin-scmcvs_4.5.14-5etch1_all.deb
MD5 checksums of the listed files are available in the original advisory.