Korean
<< Back
VID 210064
Severity 40
Port 80, ...
Protocol TCP
Class CGI
Detailed Description The GForge software is vulnerable to an arbitrary command execution vulnerability in the 'cvsweb.php' script. GForge is a Web-based collaborative development environment. Gforge versions 4.5.16 and earlier could allow a remote attacker to execute arbitrary commands on the system, caused by improper validation of user-supplied input passed to the 'plugins/scmcvs/cvsweb.php' script. By sending a specially-crafted URL request to the cvsweb.php script using the PATH_INFO parameter, a remote attacker could inject and execute arbitrary shell commands on the affected host with the privileges of the web server.

* References:
http://secunia.com/advisories/25395

* Platforms Affected:
Gforge Group, Gforge versions 4.5.16 and earlier
Any operating system Any version
Recommendation Upgrade to the latest version of Gforge at http://gforgegroup.com/downloads

For Debian GNU/Linux:
Upgrade to the fixed version of gforge-plugin-scmcvs package, as listed in Debian Security Advisory DSA-1297-1 at http://www.us.debian.org/security/2007/dsa-1297
Related URL CVE-2007-0246 (CVE)
Related URL 24141 (SecurityFocus)
Related URL 34510 (ISS)