CVE-2018-16976

Gitolite before 3.6.9 does not (in certain configurations involving @all or a regex) properly restrict access to a Git repository that is in the process of being migrated until the full set of migration steps has been completed. This can allow valid users to obtain unintended access.
Configurations

Configuration 1 (hide)

cpe:2.3:a:gitolite:gitolite:*:*:*:*:*:*:*:*

History

07 Nov 2023, 02:54

Type Values Removed Values Added
References
  • {'url': 'https://groups.google.com/forum/#!topic/gitolite-announce/WrwDTYdbfRg', 'name': 'https://groups.google.com/forum/#!topic/gitolite-announce/WrwDTYdbfRg', 'tags': ['Mailing List', 'Third Party Advisory'], 'refsource': 'MISC'}
  • () https://groups.google.com/forum/#%21topic/gitolite-announce/WrwDTYdbfRg -

Information

Published : 2018-09-12 22:29

Updated : 2023-12-10 12:44


NVD link : CVE-2018-16976

Mitre link : CVE-2018-16976

CVE.ORG link : CVE-2018-16976


JSON object : View

Products Affected

gitolite

  • gitolite
CWE
CWE-362

Concurrent Execution using Shared Resource with Improper Synchronization ('Race Condition')