SB2013052801 - Path traversal in cgit (Alpine package)
Published: May 28, 2013
Breakdown by Severity
- Low
- Medium
- High
- Critical
Description
This security bulletin contains information about 1 security vulnerability.
1) Path traversal (CVE-ID: CVE-2013-2117)
The vulnerability allows a remote attacker to perform directory traversal attacks.
The vulnerability exists due to input validation error when processing directory traversal sequences in the cgit_parse_readme function in ui-summary.c in cgit before 0.9.2, when a readme file is set to a filesystem path,. A remote authenticated attacker can send a specially crafted HTTP request and remote attackers to read arbitrary files via a . (dot dot) in the url parameter.
Remediation
Install update from vendor's website.
References
- https://git.alpinelinux.org/aports/commit/?id=2a73f399c2bd3ebf9dfdb104b20fe7eef54c68d7
- https://git.alpinelinux.org/aports/commit/?id=44e740eef26389110713c40214989466c8c83ba5
- https://git.alpinelinux.org/aports/commit/?id=627374c4da53db576ae47b5bc282a1892eb6651b
- https://git.alpinelinux.org/aports/commit/?id=8fa342f4e4662c5ac3038410c69eb77da75c66b3
- https://git.alpinelinux.org/aports/commit/?id=90230acc926f0e67bae6c891cf4b04cd4674bc95