Bugtraq mailing list archives
Re: CVStrac Remote Arbitrary Code Execution exploit
From: Richard Hipp <drh () hwaci com>
Date: 6 Aug 2004 16:51:16 -0000
In-Reply-To: <20040805175709.6995.qmail () web50508 mail yahoo com>
Received: (qmail 8445 invoked from network); 5 Aug 2004 19:10:40 -0000
Received: from outgoing.securityfocus.com (HELO outgoing2.securityfocus.com) (205.206.231.26)
by mail.securityfocus.com with SMTP; 5 Aug 2004 19:10:40 -0000
Received: from lists2.securityfocus.com (lists2.securityfocus.com [205.206.231.20])
by outgoing2.securityfocus.com (Postfix) with QMQP
id 465CF1437C6; Thu, 5 Aug 2004 12:02:39 -0600 (MDT)
Mailing-List: contact bugtraq-help () securityfocus com; run by ezmlm
Precedence: bulk
List-Id: <bugtraq.list-id.securityfocus.com>
List-Post: <mailto:bugtraq () securityfocus com>
List-Help: <mailto:bugtraq-help () securityfocus com>
List-Unsubscribe: <mailto:bugtraq-unsubscribe () securityfocus com>
List-Subscribe: <mailto:bugtraq-subscribe () securityfocus com>
Delivered-To: mailing list bugtraq () securityfocus com
Delivered-To: moderator for bugtraq () securityfocus com
Received: (qmail 25727 invoked from network); 5 Aug 2004 11:48:48 -0000
Message-ID: <20040805175709.6995.qmail () web50508 mail yahoo com>
Date: Thu, 5 Aug 2004 10:57:09 -0700 (PDT)
From: Richard Ngo <rtngo () yahoo com>
Subject: CVStrac Remote Arbitrary Code Execution exploit
To: vulndb () securityfocus com
Cc: bugtraq () securityfocus com
MIME-Version: 1.0
Content-Type: text/plain; charset=us-ascii
Hi, Im Richard Ngo, this is the first time i report an
exploit and found a remote exploit that could allow
arbitrary code execution in CVStrac.
sample exploit
filediff?f=CVSROOT/rcsinfo&v1=1.1&v2=1.2;w;
All versions vulnerable. I have not contacted
cvstrac.org since i cant find their email address.
Please give me credit for the exploit and *please dont
release the exploit code to the public* for other
websites security. Maybe just create an advisory.
Thank you.
The problem has been patched in the CVS archive and in version 1.1.4 of CVSTrac.
Current thread:
- CVStrac Remote Arbitrary Code Execution exploit Richard Ngo (Aug 05)
- <Possible follow-ups>
- Re: CVStrac Remote Arbitrary Code Execution exploit Richard Hipp (Aug 06)
