VID |
210064 |
Severity |
40 |
Port |
80, ... |
Protocol |
TCP |
Class |
CGI |
Detailed Description |
The GForge software is vulnerable to an arbitrary command execution vulnerability in the 'cvsweb.php' script. GForge is a Web-based collaborative development environment. Gforge versions 4.5.16 and earlier could allow a remote attacker to execute arbitrary commands on the system, caused by improper validation of user-supplied input passed to the 'plugins/scmcvs/cvsweb.php' script. By sending a specially-crafted URL request to the cvsweb.php script using the PATH_INFO parameter, a remote attacker could inject and execute arbitrary shell commands on the affected host with the privileges of the web server.
* References: http://secunia.com/advisories/25395
* Platforms Affected: Gforge Group, Gforge versions 4.5.16 and earlier Any operating system Any version |
Recommendation |
Upgrade to the latest version of Gforge at http://gforgegroup.com/downloads
For Debian GNU/Linux: Upgrade to the fixed version of gforge-plugin-scmcvs package, as listed in Debian Security Advisory DSA-1297-1 at http://www.us.debian.org/security/2007/dsa-1297 |
Related URL |
CVE-2007-0246 (CVE) |
Related URL |
24141 (SecurityFocus) |
Related URL |
34510 (ISS) |
|