Package: gforge
Version: 3.1-26
Severity: grave
Tags: security sarge sid patch

The sid/sarge version seems to be vulnerable to this.  Please correct it.
The correction should be in the GForge CVS, otherwise sanitising the dir
should be easy (i.e. recursively strip "../").

Candidate: CAN-2005-0299
URL: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-0299

Reference: BUGTRAQ:20050120 STG Security Advisory: [SSA-20050120-24] GForge 3.x 
directory
Reference: URL:http://marc.theaimsgroup.com/?l=bugtraq&m=110627132209963&w=2
Reference: BID:12318
Reference: URL:http://www.securityfocus.com/bid/12318
Reference: XF:gforge-dir-dirname-directory-traversal(18988)
Reference: URL:http://xforce.iss.net/xforce/xfdb/18988

Directory traversal vulnerability in GForge 3.3 and earlier allows
remote attackers to read arbitrary files via a .. (dot dot) in the (1)
dir parameter to controller.php or (2) dir_name parameter to
controlleroo.php.

Regards,

        Joey

-- 
The good thing about standards is that there are so many to choose from.
                -- Andrew S. Tanenbaum

Please always Cc to me when replying to me on the lists.


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]

Reply via email to