Vulnerabilites related to adobe - git-server
CVE-2020-9708 (GCVE-0-2020-9708)
Vulnerability from cvelistv5
Published
2020-08-14 16:48
Modified
2024-09-16 16:43
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- CWE-24 - Path Traversal: '../filedir'
Summary
The resolveRepositoryPath function doesn't properly validate user input and a malicious user may traverse to any valid Git repository outside the repoRoot. This issue may lead to unauthorized access of private Git repositories as long as the malicious user knows or brute-forces the location of the repository.
References
► | URL | Tags |
---|---|---|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T10:34:39.923Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://github.com/adobe/git-server/security/advisories/GHSA-cgj4-x2hh-2x93" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "Helix", "vendor": "Adobe", "versions": [ { "lessThan": "1.3.1", "status": "affected", "version": "unspecified", "versionType": "custom" } ] } ], "credits": [ { "lang": "en", "value": "This issue was discovered and reported by GHSL team member @JarLob (Jaroslav Loba\u010devski)." } ], "datePublic": "2020-08-10T00:00:00", "descriptions": [ { "lang": "en", "value": "The resolveRepositoryPath function doesn\u0027t properly validate user input and a malicious user may traverse to any valid Git repository outside the repoRoot. This issue may lead to unauthorized access of private Git repositories as long as the malicious user knows or brute-forces the location of the repository." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.9, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-24", "description": "CWE-24 Path Traversal: \u0027../filedir\u0027", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2020-08-14T16:48:30", "orgId": "078d4453-3bcd-4900-85e6-15281da43538", "shortName": "adobe" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://github.com/adobe/git-server/security/advisories/GHSA-cgj4-x2hh-2x93" } ], "source": { "discovery": "EXTERNAL" }, "title": "GHSL-2020-133: Insufficient validation of user input in resolveRepositoryPath function", "x_generator": { "engine": "Vulnogram 0.0.9" }, "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@adobe.com", "DATE_PUBLIC": "2020-08-10T23:00:00.000Z", "ID": "CVE-2020-9708", "STATE": "PUBLIC", "TITLE": "GHSL-2020-133: Insufficient validation of user input in resolveRepositoryPath function" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "Helix", "version": { "version_data": [ { "version_affected": "\u003c", "version_value": "1.3.1" } ] } } ] }, "vendor_name": "Adobe" } ] } }, "credit": [ { "lang": "eng", "value": "This issue was discovered and reported by GHSL team member @JarLob (Jaroslav Loba\u010devski)." } ], "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "The resolveRepositoryPath function doesn\u0027t properly validate user input and a malicious user may traverse to any valid Git repository outside the repoRoot. This issue may lead to unauthorized access of private Git repositories as long as the malicious user knows or brute-forces the location of the repository." } ] }, "generator": { "engine": "Vulnogram 0.0.9" }, "impact": { "cvss": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.9, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" } }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "CWE-24 Path Traversal: \u0027../filedir\u0027" } ] } ] }, "references": { "reference_data": [ { "name": "https://github.com/adobe/git-server/security/advisories/GHSA-cgj4-x2hh-2x93", "refsource": "MISC", "url": "https://github.com/adobe/git-server/security/advisories/GHSA-cgj4-x2hh-2x93" } ] }, "source": { "discovery": "EXTERNAL" } } } }, "cveMetadata": { "assignerOrgId": "078d4453-3bcd-4900-85e6-15281da43538", "assignerShortName": "adobe", "cveId": "CVE-2020-9708", "datePublished": "2020-08-14T16:48:30.769927Z", "dateReserved": "2020-03-02T00:00:00", "dateUpdated": "2024-09-16T16:43:25.441Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
Vulnerability from fkie_nvd
Published
2020-08-14 17:15
Modified
2024-11-21 05:41
Severity ?
5.9 (Medium) - CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N
7.5 (High) - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
7.5 (High) - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
Summary
The resolveRepositoryPath function doesn't properly validate user input and a malicious user may traverse to any valid Git repository outside the repoRoot. This issue may lead to unauthorized access of private Git repositories as long as the malicious user knows or brute-forces the location of the repository.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
adobe | git-server | * |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:adobe:git-server:*:*:*:*:*:*:*:*", "matchCriteriaId": "42D8FA60-B00F-40B1-9EBB-1960F9B99E92", "versionEndExcluding": "1.3.1", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "The resolveRepositoryPath function doesn\u0027t properly validate user input and a malicious user may traverse to any valid Git repository outside the repoRoot. This issue may lead to unauthorized access of private Git repositories as long as the malicious user knows or brute-forces the location of the repository." }, { "lang": "es", "value": "Una funci\u00f3n resolveRepositoryPath no comprueba apropiadamente una entrada del usuario y un usuario malicioso puede saltar a cualquier repositorio de Git comprobado fuera del repoRoot. Este problema puede conllevar a un acceso no autorizado a unos repositorios de Git privados siempre que el usuario malicioso tenga conocimiento o aplique fuerza bruta a la ubicaci\u00f3n del repositorio." } ], "id": "CVE-2020-9708", "lastModified": "2024-11-21T05:41:08.267", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 5.0, "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV31": [ { "cvssData": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.9, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "exploitabilityScore": 2.2, "impactScore": 3.6, "source": "psirt@adobe.com", "type": "Secondary" }, { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2020-08-14T17:15:14.530", "references": [ { "source": "psirt@adobe.com", "tags": [ "Third Party Advisory" ], "url": "https://github.com/adobe/git-server/security/advisories/GHSA-cgj4-x2hh-2x93" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://github.com/adobe/git-server/security/advisories/GHSA-cgj4-x2hh-2x93" } ], "sourceIdentifier": "psirt@adobe.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-24" } ], "source": "psirt@adobe.com", "type": "Secondary" }, { "description": [ { "lang": "en", "value": "CWE-22" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }