Roundup: Filesystem access vulnerability
Gentoo Linux Security Advisory
||GLSA 200408-09 / Roundup
||August 11, 2004
||May 22, 2006: 03
All supported architectures
Roundup will make files owned by the user that it's running as accessable
to a remote attacker.
Roundup is a simple to use issue-tracking system with command-line,
web, and e-mail interfaces.
Improper handling of a specially crafted URL allows access to the
server's filesystem, which could contain sensitive information.
An attacker could view files owned by the user running Roundup. This
will never be root however, as Roundup will not run as root.
There is no known workaround at this time. All users are encouraged to
upgrade to the latest available version of Roundup.
All Roundup users should upgrade to the latest version:
Code Listing 3.1: Resolution
# emerge sync
# emerge -pv ">=www-apps/roundup-0.7.6"
# emerge ">=www-apps/roundup-0.7.6"