BugTraq
Re: CVStrac Remote Arbitrary Code Execution exploit Aug 06 2004 04:51PM
Richard Hipp (drh hwaci com)
In-Reply-To: <20040805175709.6995.qmail (at) web50508.mail.yahoo (dot) com [email concealed]>

>Received: (qmail 8445 invoked from network); 5 Aug 2004 19:10:40 -0000

>Received: from outgoing.securityfocus.com (HELO outgoing2.securityfocus.com) (205.206.231.26)

> by mail.securityfocus.com with SMTP; 5 Aug 2004 19:10:40 -0000

>Received: from lists2.securityfocus.com (lists2.securityfocus.com [205.206.231.20])

> by outgoing2.securityfocus.com (Postfix) with QMQP

> id 465CF1437C6; Thu, 5 Aug 2004 12:02:39 -0600 (MDT)

>Mailing-List: contact bugtraq-help (at) securityfocus (dot) com [email concealed]; run by ezmlm

>Precedence: bulk

>List-Id: <bugtraq.list-id.securityfocus.com>

>List-Post: <mailto:bugtraq (at) securityfocus (dot) com [email concealed]>

>List-Help: <mailto:bugtraq-help (at) securityfocus (dot) com [email concealed]>

>List-Unsubscribe: <mailto:bugtraq-unsubscribe (at) securityfocus (dot) com [email concealed]>

>List-Subscribe: <mailto:bugtraq-subscribe (at) securityfocus (dot) com [email concealed]>

>Delivered-To: mailing list bugtraq (at) securityfocus (dot) com [email concealed]

>Delivered-To: moderator for bugtraq (at) securityfocus (dot) com [email concealed]

>Received: (qmail 25727 invoked from network); 5 Aug 2004 11:48:48 -0000

>Message-ID: <20040805175709.6995.qmail (at) web50508.mail.yahoo (dot) com [email concealed]>

>Date: Thu, 5 Aug 2004 10:57:09 -0700 (PDT)

>From: Richard Ngo <rtngo (at) yahoo (dot) com [email concealed]>

>Subject: CVStrac Remote Arbitrary Code Execution exploit

>To: vulndb (at) securityfocus (dot) com [email concealed]

>Cc: bugtraq (at) securityfocus (dot) com [email concealed]

>MIME-Version: 1.0

>Content-Type: text/plain; charset=us-ascii

>

>Hi, Im Richard Ngo, this is the first time i report an

>exploit and found a remote exploit that could allow

>arbitrary code execution in CVStrac.

>

>sample exploit

>

>filediff?f=CVSROOT/rcsinfo&v1=1.1&v2=1.2;w;

>

>All versions vulnerable. I have not contacted

>cvstrac.org since i cant find their email address.

>Please give me credit for the exploit and *please dont

>release the exploit code to the public* for other

>websites security. Maybe just create an advisory.

>Thank you.

>

The problem has been patched in the CVS archive and

in version 1.1.4 of CVSTrac.

[ reply ]


 

Privacy Statement
Copyright 2010, SecurityFocus