| VID |
210064 |
| Severity |
40 |
| Port |
80, ... |
| Protocol |
TCP |
| Class |
CGI |
| Detailed Description |
The GForge software is vulnerable to an arbitrary command execution vulnerability in the 'cvsweb.php' script. GForge is a Web-based collaborative development environment. Gforge versions 4.5.16 and earlier could allow a remote attacker to execute arbitrary commands on the system, caused by improper validation of user-supplied input passed to the 'plugins/scmcvs/cvsweb.php' script. By sending a specially-crafted URL request to the cvsweb.php script using the PATH_INFO parameter, a remote attacker could inject and execute arbitrary shell commands on the affected host with the privileges of the web server.
* References: http://secunia.com/advisories/25395
* Platforms Affected: Gforge Group, Gforge versions 4.5.16 and earlier Any operating system Any version |
| Recommendation |
Upgrade to the latest version of Gforge at http://gforgegroup.com/downloads
For Debian GNU/Linux: Upgrade to the fixed version of gforge-plugin-scmcvs package, as listed in Debian Security Advisory DSA-1297-1 at http://www.us.debian.org/security/2007/dsa-1297 |
| Related URL |
CVE-2007-0246 (CVE) |
| Related URL |
24141 (SecurityFocus) |
| Related URL |
34510 (ISS) |
|