Korean
<< Back
VID 21883
Severity 30
Port 80, ...
Protocol TCP
Class CGI
Detailed Description The GForge is vulnerable to directory traversal vulnerabilities which exist in versions 3.3 and earlier. GForge is a Web-based collaborative development environment. GForge versions 3.3 and earlier could allow a remote attacker to to list arbitrary directories via a specially-crafted HTTP request including "dot dot" sequences (/../) in the the dir parameter of the controller.php script or the dir_name parameter of the controlleroo.php script. If the register_globals is enabled, a remote attacker could exploit these vulnerabilities to traverse directories on the Web server to read arbitrary files on the affected host subject to the permissions of the web server user id.

* References:
http://marc.theaimsgroup.com/?l=bugtraq&m=110627132209963&w=2
http://secunia.com/advisories/13845/

* Platforms Affected:
GForge Group, GForge versions 3.3 and earlier
Linux Any version
Recommendation Upgrade to the latest version of GForge (4.0 or later), available from the GForge Web site at http://gforgegroup.com/
Related URL CVE-2005-0299 (CVE)
Related URL 12318 (SecurityFocus)
Related URL 18988 (ISS)