Lucene search

K
debianDebianDEBIAN:DSA-3275-1:77E8D
HistoryMay 30, 2015 - 9:01 a.m.

[SECURITY] [DSA 3275-1] fusionforge security update

2015-05-3009:01:28
lists.debian.org
7

10 High

CVSS2

Access Vector

NETWORK

Access Complexity

LOW

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:N/AC:L/Au:N/C:C/I:C/A:C

0.018 Low

EPSS

Percentile

88.2%


Debian Security Advisory DSA-3275-1 [email protected]
http://www.debian.org/security/ Salvatore Bonaccorso
May 30, 2015 http://www.debian.org/security/faq


Package : fusionforge
CVE ID : CVE-2015-0850

Ansgar Burchardt discovered that the Git plugin for FusionForge, a
web-based project-management and collaboration software, does not
sufficiently validate user provided input as parameter to the method to
create secondary Git repositories. A remote attacker can use this flaw
to execute arbitrary code as root via a specially crafted URL.

For the stable distribution (jessie), this problem has been fixed in
version 5.3.2+20141104-3+deb8u1.

For the testing distribution (stretch) and the unstable distribution
(sid), this problem will be fixed soon.

We recommend that you upgrade your fusionforge packages.

Further information about Debian Security Advisories, how to apply
these updates to your system and frequently asked questions can be
found at: https://www.debian.org/security/

Mailing list: [email protected]

10 High

CVSS2

Access Vector

NETWORK

Access Complexity

LOW

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:N/AC:L/Au:N/C:C/I:C/A:C

0.018 Low

EPSS

Percentile

88.2%