An attacker with administration privileges but without direct filesystem access can download and execute arbitrary commands

XMLWordPrintable

    • Type: Public Security Vulnerability
    • Resolution: Fixed
    • Priority: Low
    • 4.8.12
    • Affects Version/s: 4.8.12
    • Component/s: None
    • None
    • 4.7
    • Medium

      A new attack vector discovered relies on the fact that an attacker can remotely trigger a download of a malicious script via repository clone operation. And that such script can imitate the behavior of git/hg/p4 commands, thus bypassing the security checks present on the administration page.

            Assignee:
            Unassigned
            Reporter:
            Serhii Lisovskyi (Inactive)
            Votes:
            0 Vote for this issue
            Watchers:
            1 Start watching this issue

              Created:
              Updated:
              Resolved: