It was found that the Git plug-in in FusionForge, a web-based project-management and collaboration software, did not correctly sanitize user-provided input as a parameter to the method which creates secondary Git repositories. A remote attacker could use this flaw to execute arbitrary code as root via a specially crafted URL. This issue is fixed in FusionForge 6.0rc4: https://fusionforge.org/forum/forum.php?forum_id=41
Created fusionforge tracking bugs for this issue: Affects: fedora-all [bug 1226873]
- Edited existing update requests for F21 and F22 to reference bug IDs. - Rawhide already fixed :)
(In reply to Sylvain Beucler from comment #2) > - Edited existing update requests for F21 and F22 to reference bug IDs. > - Rawhide already fixed :) Fantastic! Thanks for the quick turn-around ;)
fusionforge-5.3.2-4.fc21 has been pushed to the Fedora 21 stable repository. If problems still persist, please make note of it in this bug report.
fusionforge-5.3.2-4.fc22 has been pushed to the Fedora 22 stable repository. If problems still persist, please make note of it in this bug report.