VID |
21883 |
Severity |
30 |
Port |
80, ... |
Protocol |
TCP |
Class |
CGI |
Detailed Description |
The GForge is vulnerable to directory traversal vulnerabilities which exist in versions 3.3 and earlier. GForge is a Web-based collaborative development environment. GForge versions 3.3 and earlier could allow a remote attacker to to list arbitrary directories via a specially-crafted HTTP request including "dot dot" sequences (/../) in the the dir parameter of the controller.php script or the dir_name parameter of the controlleroo.php script. If the register_globals is enabled, a remote attacker could exploit these vulnerabilities to traverse directories on the Web server to read arbitrary files on the affected host subject to the permissions of the web server user id.
* References: http://marc.theaimsgroup.com/?l=bugtraq&m=110627132209963&w=2 http://secunia.com/advisories/13845/
* Platforms Affected: GForge Group, GForge versions 3.3 and earlier Linux Any version |
Recommendation |
Upgrade to the latest version of GForge (4.0 or later), available from the GForge Web site at http://gforgegroup.com/ |
Related URL |
CVE-2005-0299 (CVE) |
Related URL |
12318 (SecurityFocus) |
Related URL |
18988 (ISS) |
|