View | Details | Raw Unified | Return to bug 230360
Collapse All | Expand All

(-)vuln.xml (+26 lines)
Lines 58-63 Link Here
58
  * Do not forget port variants (linux-f10-libxml2, libxml2, etc.)
58
  * Do not forget port variants (linux-f10-libxml2, libxml2, etc.)
59
-->
59
-->
60
<vuxml xmlns="http://www.vuxml.org/apps/vuxml-1">
60
<vuxml xmlns="http://www.vuxml.org/apps/vuxml-1">
61
  <vuln vid="06c4a79b-981d-11e8-b460-9c5c8e75236a">
62
    <topic>cgit -- directory traversal vulnerability</topic>
63
    <affects>
64
      <package>
65
	<name>cgit</name>
66
	<range><lt>1.2.1</lt></range>
67
      </package>
68
    </affects>
69
    <description>
70
      <body xmlns="http://www.w3.org/1999/xhtml">
71
	<p>Jann Horn reports:</p>
72
	<blockquote cite="https://lists.zx2c4.com/pipermail/cgit/2018-August/004176.html">
73
	  <p>cgit_clone_objects in CGit before 1.2.1 has a directory traversal vulnerability when `enable-http-clone=1` is not turned off, as demonstrated by a cgit/cgit.cgi/git/objects/?path=../ request.</p>
74
	</blockquote>
75
      </body>
76
    </description>
77
    <references>
78
      <url>https://lists.zx2c4.com/pipermail/cgit/2018-August/004176.html</url>
79
      <cvename>CVE-2018-14912</cvename>
80
    </references>
81
    <dates>
82
      <discovery>2018-08-03</discovery>
83
      <entry>2018-08-04</entry>
84
    </dates>
85
  </vuln>
86
61
  <vuln vid="e309a2c7-598b-4fa6-a398-bc72fbd1d167">
87
  <vuln vid="e309a2c7-598b-4fa6-a398-bc72fbd1d167">
62
    <topic>rubygem-doorkeeper -- token revocation vulnerability</topic>
88
    <topic>rubygem-doorkeeper -- token revocation vulnerability</topic>
63
    <affects>
89
    <affects>

Return to bug 230360