This CPE summary could be partial or incomplete. Please contact us for a detailed listing.

Summary

Detail
Vendor Gitolite First view 2011-10-04
Product Gitolite Last view 2019-11-07
Version Type Application
Update  
Edition  
Language  
Sofware Edition  
Target Software  
Target Hardware  
Other  

Activity : Overall

COMMON PLATFORM ENUMERATION: Repartition per Version

CPE Name Affected CVE
cpe:2.3:a:gitolite:gitolite:0.55:*:*:*:*:*:*:* 6
cpe:2.3:a:gitolite:gitolite:1.3:*:*:*:*:*:*:* 6
cpe:2.3:a:gitolite:gitolite:1.2:*:*:*:*:*:*:* 6
cpe:2.3:a:gitolite:gitolite:0.70:*:*:*:*:*:*:* 6
cpe:2.3:a:gitolite:gitolite:0.65:*:*:*:*:*:*:* 6
cpe:2.3:a:gitolite:gitolite:1.0:*:*:*:*:*:*:* 6
cpe:2.3:a:gitolite:gitolite:0.95:*:*:*:*:*:*:* 6
cpe:2.3:a:gitolite:gitolite:0.50:*:*:*:*:*:*:* 6
cpe:2.3:a:gitolite:gitolite:1.4:*:*:*:*:*:*:* 6
cpe:2.3:a:gitolite:gitolite:0.85:*:*:*:*:*:*:* 6
cpe:2.3:a:gitolite:gitolite:0.90:*:*:*:*:*:*:* 6
cpe:2.3:a:gitolite:gitolite:0.80:*:*:*:*:*:*:* 6
cpe:2.3:a:gitolite:gitolite:*:*:*:*:*:*:*:* 6
cpe:2.3:a:gitolite:gitolite:0.60:*:*:*:*:*:*:* 6
cpe:2.3:a:gitolite:gitolite:1.1:*:*:*:*:*:*:* 6
cpe:2.3:a:gitolite:gitolite:1.0:rc1:*:*:*:*:*:* 6
cpe:2.3:a:gitolite:gitolite:3.0:*:*:*:*:*:*:* 5
cpe:2.3:a:gitolite:gitolite:3.01:*:*:*:*:*:*:* 5
cpe:2.3:a:gitolite:gitolite:3.02:*:*:*:*:*:*:* 5
cpe:2.3:a:gitolite:gitolite:3.03:*:*:*:*:*:*:* 5
cpe:2.3:a:gitolite:gitolite:3.04:*:*:*:*:*:*:* 5
cpe:2.3:a:gitolite:gitolite:1.5.4:*:*:*:*:*:*:* 5
cpe:2.3:a:gitolite:gitolite:1.5.3:*:*:*:*:*:*:* 5
cpe:2.3:a:gitolite:gitolite:1.5.8:*:*:*:*:*:*:* 5
cpe:2.3:a:gitolite:gitolite:1.5.7:*:*:*:*:*:*:* 5
cpe:2.3:a:gitolite:gitolite:1.5:*:*:*:*:*:*:* 5
cpe:2.3:a:gitolite:gitolite:1.4.2:*:*:*:*:*:*:* 5
cpe:2.3:a:gitolite:gitolite:1.5.1:*:*:*:*:*:*:* 5
cpe:2.3:a:gitolite:gitolite:1.5.2:*:*:*:*:*:*:* 5
cpe:2.3:a:gitolite:gitolite:1.5.6:*:*:*:*:*:*:* 5
cpe:2.3:a:gitolite:gitolite:1.5.5:*:*:*:*:*:*:* 5
cpe:2.3:a:gitolite:gitolite:1.4.1:*:*:*:*:*:*:* 5

Related : CVE

  Date Alert Description
9.8 2019-11-07 CVE-2010-2447

gitolite before 1.4.1 does not filter src/ or hooks/ from path names.

8.1 2019-01-09 CVE-2018-20683

commands/rsync in Gitolite before 3.6.11, if .gitolite.rc enables rsync, mishandles the rsync command line, which allows attackers to have a "bad" impact by triggering use of an option other than -v, -n, -q, or -P.

5.5 2018-09-21 CVE-2013-7203

gitolite before commit fa06a34 might allow local users to read arbitrary files in repositories via vectors related to the user umask when running gitolite setup.

9.8 2018-09-21 CVE-2013-4451

gitolite commit fa06a34 through 3.5.3 might allow attackers to have unspecified impact via vectors involving world-writable permissions when creating (1) ~/.gitolite.rc, (2) ~/.gitolite, or (3) ~/repositories/gitolite-admin.git on fresh installs.

8.1 2018-09-12 CVE-2018-16976

Gitolite before 3.6.9 does not (in certain configurations involving @all or a regex) properly restrict access to a Git repository that is in the process of being migrated until the full set of migration steps has been completed. This can allow valid users to obtain unintended access.

4.6 2012-10-22 CVE-2012-4506

Directory traversal vulnerability in gitolite 3.x before 3.1, when wild card repositories and a pattern matching "../" are enabled, allows remote authenticated users to create arbitrary repositories and possibly perform other actions via a .. (dot dot) in a repository name.

6.8 2011-10-04 CVE-2011-1572

Directory traversal vulnerability in the Admin Defined Commands (ADC) feature in gitolite before 1.5.9.1 allows remote attackers to execute arbitrary commands via .. (dot dot) sequences in admin-defined commands.

CWE : Common Weakness Enumeration

%idName
28% (2) CWE-22 Improper Limitation of a Pathname to a Restricted Directory ('Path ...
28% (2) CWE-20 Improper Input Validation
14% (1) CWE-362 Race Condition
14% (1) CWE-264 Permissions, Privileges, and Access Controls
14% (1) CWE-200 Information Exposure

Open Source Vulnerability Database (OSVDB)

id Description
72538 gitolite Admin-Defined Commands (ADC) Traversal Arbitrary Command Execution

OpenVAS Exploits

id Description
2012-10-22 Name : FreeBSD Ports: gitolite
File : nvt/freebsd_gitolite.nasl
2011-05-12 Name : Debian Security Advisory DSA 2215-1 (gitolite)
File : nvt/deb_2215_1.nasl

Nessus® Vulnerability Scanner

id Description
2019-01-03 Name: The remote Fedora host is missing a security update.
File: fedora_2018-d0bac4ff3b.nasl - Type: ACT_GATHER_INFO
2019-01-03 Name: The remote Fedora host is missing a security update.
File: fedora_2018-dc060c6f2a.nasl - Type: ACT_GATHER_INFO
2018-10-19 Name: The remote Amazon Linux AMI host is missing a security update.
File: ala_ALAS-2018-1092.nasl - Type: ACT_GATHER_INFO
2018-09-24 Name: The remote Fedora host is missing a security update.
File: fedora_2018-7993dea41b.nasl - Type: ACT_GATHER_INFO
2014-12-15 Name: The remote Gentoo host is missing one or more security-related patches.
File: gentoo_GLSA-201412-09.nasl - Type: ACT_GATHER_INFO
2014-01-05 Name: The remote Fedora host is missing a security update.
File: fedora_2013-23951.nasl - Type: ACT_GATHER_INFO
2014-01-05 Name: The remote Fedora host is missing a security update.
File: fedora_2013-23953.nasl - Type: ACT_GATHER_INFO
2012-10-16 Name: The remote FreeBSD host is missing a security-related update.
File: freebsd_pkg_f94befcd128911e2a25e525400272390.nasl - Type: ACT_GATHER_INFO