Your message dated Fri, 11 Feb 2005 08:43:08 +0100
with message-id <[EMAIL PROTECTED]>
and subject line Bug#294688: CAN-2005-0299: Directory traversal in GForge
has caused the attached Bug report to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what I am
talking about this indicates a serious mail system misconfiguration
somewhere.  Please contact me immediately.)

Debian bug tracking system administrator
(administrator, Debian Bugs database)

--------------------------------------
Received: (at submit) by bugs.debian.org; 11 Feb 2005 05:17:22 +0000
>From [EMAIL PROTECTED] Thu Feb 10 21:17:22 2005
Return-path: <[EMAIL PROTECTED]>
Received: from luonnotar.infodrom.org [195.124.48.78] 
        by spohr.debian.org with esmtp (Exim 3.35 1 (Debian))
        id 1CzTBC-0000xE-00; Thu, 10 Feb 2005 21:17:22 -0800
Received: by luonnotar.infodrom.org (Postfix, from userid 10)
        id 8B3F7366B74; Fri, 11 Feb 2005 06:17:25 +0100 (CET)
Received: at Infodrom Oldenburg (/\##/\ Smail-3.2.0.102 1998-Aug-2 #2)
        from infodrom.org by finlandia.Infodrom.North.DE
        via smail from stdin
        id <[EMAIL PROTECTED]>
        for [EMAIL PROTECTED]; Fri, 11 Feb 2005 06:15:18 +0100 (CET) 
Date: Fri, 11 Feb 2005 06:15:17 +0100
From: Martin Schulze <[EMAIL PROTECTED]>
To: [EMAIL PROTECTED]
Subject: CAN-2005-0299: Directory traversal in GForge
Message-ID: <[EMAIL PROTECTED]>
Mime-Version: 1.0
Content-Type: text/plain; charset=iso-8859-1
Content-Disposition: inline
X-Debbugs-Cc: [EMAIL PROTECTED]
User-Agent: Mutt/1.5.6+20040907i
Delivered-To: [EMAIL PROTECTED]
X-Spam-Checker-Version: SpamAssassin 2.60-bugs.debian.org_2005_01_02 
        (1.212-2003-09-23-exp) on spohr.debian.org
X-Spam-Status: No, hits=-11.0 required=4.0 tests=BAYES_00,HAS_PACKAGE,
        X_DEBBUGS_CC autolearn=ham version=2.60-bugs.debian.org_2005_01_02
X-Spam-Level: 

Package: gforge
Version: 3.1-26
Severity: grave
Tags: security sarge sid patch

The sid/sarge version seems to be vulnerable to this.  Please correct it.
The correction should be in the GForge CVS, otherwise sanitising the dir
should be easy (i.e. recursively strip "../").

Candidate: CAN-2005-0299
URL: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-0299

Reference: BUGTRAQ:20050120 STG Security Advisory: [SSA-20050120-24] GForge 3.x 
directory
Reference: URL:http://marc.theaimsgroup.com/?l=bugtraq&m=110627132209963&w=2
Reference: BID:12318
Reference: URL:http://www.securityfocus.com/bid/12318
Reference: XF:gforge-dir-dirname-directory-traversal(18988)
Reference: URL:http://xforce.iss.net/xforce/xfdb/18988

Directory traversal vulnerability in GForge 3.3 and earlier allows
remote attackers to read arbitrary files via a .. (dot dot) in the (1)
dir parameter to controller.php or (2) dir_name parameter to
controlleroo.php.

Regards,

        Joey

-- 
The good thing about standards is that there are so many to choose from.
                -- Andrew S. Tanenbaum

Please always Cc to me when replying to me on the lists.

---------------------------------------
Received: (at 294688-done) by bugs.debian.org; 11 Feb 2005 07:47:28 +0000
>From [EMAIL PROTECTED] Thu Feb 10 23:47:28 2005
Return-path: <[EMAIL PROTECTED]>
Received: from luonnotar.infodrom.org [195.124.48.78] 
        by spohr.debian.org with esmtp (Exim 3.35 1 (Debian))
        id 1CzVWR-0003XN-00; Thu, 10 Feb 2005 23:47:28 -0800
Received: by luonnotar.infodrom.org (Postfix, from userid 10)
        id BF51C366B74; Fri, 11 Feb 2005 08:47:31 +0100 (CET)
Received: at Infodrom Oldenburg (/\##/\ Smail-3.2.0.102 1998-Aug-2 #2)
        from infodrom.org by finlandia.Infodrom.North.DE
        via smail from stdin
        id <[EMAIL PROTECTED]>
        for [EMAIL PROTECTED]; Fri, 11 Feb 2005 08:43:08 +0100 (CET) 
Date: Fri, 11 Feb 2005 08:43:08 +0100
From: Martin Schulze <[EMAIL PROTECTED]>
To: Julien Cristau <[EMAIL PROTECTED]>
Cc: [EMAIL PROTECTED]
Subject: Re: Bug#294688: CAN-2005-0299: Directory traversal in GForge
Message-ID: <[EMAIL PROTECTED]>
References: <[EMAIL PROTECTED]> <[EMAIL PROTECTED]>
Mime-Version: 1.0
Content-Type: text/plain; charset=iso-8859-1
Content-Disposition: inline
In-Reply-To: <[EMAIL PROTECTED]>
User-Agent: Mutt/1.5.6+20040907i
Delivered-To: [EMAIL PROTECTED]
X-Spam-Checker-Version: SpamAssassin 2.60-bugs.debian.org_2005_01_02 
        (1.212-2003-09-23-exp) on spohr.debian.org
X-Spam-Status: No, hits=-6.0 required=4.0 tests=BAYES_00,HAS_BUG_NUMBER 
        autolearn=no version=2.60-bugs.debian.org_2005_01_02
X-Spam-Level: 

Julien Cristau wrote:
> On 11/02/2005-06:32, Martin Schulze wrote:
> 
> > Package: gforge
> > Version: 3.1-26
> > Severity: grave
> > Tags: security sarge sid patch
> > 
> > The sid/sarge version seems to be vulnerable to this.  Please correct it.
> > The correction should be in the GForge CVS, otherwise sanitising the dir
> > should be easy (i.e. recursively strip "../").
> > 
> > Candidate: CAN-2005-0299
> > URL: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-0299
> > 
> Hi Joey,
> 
> isn't this bug a duplicate of Bug#291718, which was closed by the upload 
> of gforge 3.1-26 ?
> Changelog says:
> 
> gforge (3.1-26) unstable; urgency=high
> 
>   * Disabled controller.php and controlleroo.php because of security
>     risks, hence the high urgency upload (closes: #291718).
> 
>  -- Roland Mas <[EMAIL PROTECTED]>  Sun, 23 Jan 2005 12:59:25 +0100

Oops.  I only checked the code, not whether the files in question
were enabled or not.  If they're not used, we're done.

Regards,

        Joey

-- 
The good thing about standards is that there are so many to choose from.
                -- Andrew S. Tanenbaum

Please always Cc to me when replying to me on the lists.


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]

Reply via email to