Untriaged
Permalink
CVE-2024-47515
8.1 HIGH
- CVSS version: 3.1
- Attack vector (AV): NETWORK
- Attack complexity (AC): LOW
- Privileges required (PR): LOW
- User interaction (UI): NONE
- Scope (S): UNCHANGED
- Confidentiality impact (C): HIGH
- Integrity impact (I): HIGH
- Availability impact (A): NONE
Pagure: generate_archive() follows symbolic links in temporary clones
A vulnerability was found in Pagure. Support of symbolic links during repository archiving of repositories allows the disclosure of local files. This flaw allows a malicious user to take advantage of the Pagure instance.
References
- RHBZ#2315806 issue-tracking x_refsource_REDHAT
- https://access.redhat.com/security/cve/CVE-2024-47515 x_refsource_REDHAT vdb-entry
- RHBZ#2315806 issue-tracking x_refsource_REDHAT
- https://access.redhat.com/security/cve/CVE-2024-47515 x_refsource_REDHAT vdb-entry
- RHBZ#2315806 issue-tracking x_refsource_REDHAT
- https://access.redhat.com/security/cve/CVE-2024-47515 x_refsource_REDHAT vdb-entry
- RHBZ#2315806 issue-tracking x_refsource_REDHAT
Affected products
pagure
- ==5.14.1
Matching in nixpkgs
pkgs.haskellPackages.pagure
Pagure REST client library
-
nixos-unstable -
- nixpkgs-unstable 0.2.1
pkgs.haskellPackages.pagure-cli
A Pagure gitforge query tool
-
nixos-unstable -
- nixpkgs-unstable 0.2.2