Untriaged
Permalink
CVE-2024-4981
7.6 HIGH
- CVSS version: 3.1
- Attack vector (AV): NETWORK
- Attack complexity (AC): LOW
- Privileges required (PR): LOW
- User interaction (UI): NONE
- Scope (S): UNCHANGED
- Confidentiality impact (C): HIGH
- Integrity impact (I): LOW
- Availability impact (A): LOW
Pagure: _update_file_in_git() follows symbolic links in temporary clones
A vulnerability was discovered in Pagure server. If a malicious user were to submit a git repository with symbolic links, the server could unintentionally show incorporate and make visible content from outside the git repo.
References
- https://access.redhat.com/security/cve/CVE-2024-4981 x_refsource_REDHAT vdb-entry
- https://bugzilla.redhat.com/show_bug.cgi?id=2278745
- RHBZ#2280723 issue-tracking x_refsource_REDHAT
- https://pagure.io/pagure/c/454f2677bc50d7176f07da9784882eb2176537f4
Affected products
pagure
- <5.14.1
Matching in nixpkgs
pkgs.haskellPackages.pagure
Pagure REST client library
-
nixos-unstable -
- nixpkgs-unstable 0.2.1
pkgs.haskellPackages.pagure-cli
A Pagure gitforge query tool
-
nixos-unstable -
- nixpkgs-unstable 0.2.2