Upstream information
Description
Directory traversal vulnerability in gitolite 3.x before 3.1, when wild card repositories and a pattern matching "../" are enabled, allows remote authenticated users to create arbitrary repositories and possibly perform other actions via a .. (dot dot) in a repository name.SUSE information
Overall state of this security issue: Does not affect SUSE products
This issue is currently rated as having moderate severity.
| CVSS detail | National Vulnerability Database | 
|---|---|
| Base Score | 4.6 | 
| Vector | AV:N/AC:H/Au:S/C:P/I:P/A:P | 
| Access Vector | Network | 
| Access Complexity | High | 
| Authentication | Single | 
| Confidentiality Impact | Partial | 
| Integrity Impact | Partial | 
| Availability Impact | Partial | 
SUSE Timeline for this CVE
CVE page created: Tue Jul 9 19:35:31 2013CVE page last modified: Mon Oct 6 18:18:15 2025
