FreeBSD : gitolite -- path traversal vulnerability (f94befcd-1289-11e2-a25e-525400272390)

This script is Copyright (C) 2012-2013 Tenable Network Security, Inc.


Synopsis :

The remote FreeBSD host is missing a security-related update.

Description :

Sitaram Chamarty reports :

I'm sorry to say there is a potential path traversal vulnerability in
v3. Thanks to Stephane Chazelas for finding it and alerting me.

Can it affect you? This can only affect you if you are using wild card
repos, *and* at least one of your patterns allows the string '../' to
match multiple times.

How badly can it affect you? A malicious user who *also* has the
ability to create arbitrary files in, say, /tmp (e.g., he has his own
userid on the same box), can compromise the entire 'git' user.
Otherwise the worst he can do is create arbitrary repos in /tmp.

See also :

http://www.nessus.org/u?1f366f0f
http://www.nessus.org/u?1e1e5106

Solution :

Update the affected package.

Risk factor :

Medium / CVSS Base Score : 4.6
(CVSS2#AV:N/AC:H/Au:S/C:P/I:P/A:P)

Family: FreeBSD Local Security Checks

Nessus Plugin ID: 62553 ()

Bugtraq ID:

CVE ID: CVE-2012-4506

Ready to Amp Up Your Nessus Experience?

Get Nessus Professional to scan unlimited IPs, run compliance checks & more

Buy Nessus Professional Now