blob: 8fc9bdb961910f7773cd177100a28fe3f44292ec [file] [log] [blame]
<?xml version="1.0" encoding="utf-8"?>
<glsa id="200408-09">
<title>Roundup: Filesystem access vulnerability</title>
Roundup will make files owned by the user that it's running as accessable
to a remote attacker.
<product type="ebuild">Roundup</product>
<announced>August 11, 2004</announced>
<revised>May 22, 2006: 03</revised>
<package name="www-apps/roundup" auto="yes" arch="*">
<unaffected range="ge">0.7.6</unaffected>
<vulnerable range="le">0.6.4</vulnerable>
Roundup is a simple to use issue-tracking system with command-line,
web, and e-mail interfaces.
Improper handling of a specially crafted URL allows access to the
server's filesystem, which could contain sensitive information.
<impact type="low">
An attacker could view files owned by the user running Roundup. This
will never be root however, as Roundup will not run as root.
There is no known workaround at this time. All users are encouraged to
upgrade to the latest available version of Roundup.
All Roundup users should upgrade to the latest version:
# emerge sync
# emerge -pv &quot;&gt;=www-apps/roundup-0.7.6&quot;
# emerge &quot;&gt;=www-apps/roundup-0.7.6&quot;</code>
<uri link="">Secunia Advisory SA11801</uri>
<uri link="">CVE-2004-1444</uri>
<metadata tag="submitter" timestamp="Mon, 9 Aug 2004 18:49:24 +0000">