Roundup: Filesystem access vulnerability — GLSA 200408-09

Roundup will make files owned by the user that it's running as accessable to a remote attacker.

Affected packages

www-apps/roundup on all architectures
Affected versions <= 0.6.4
Unaffected versions >= 0.7.6

Background

Roundup is a simple to use issue-tracking system with command-line, web, and e-mail interfaces.

Description

Improper handling of a specially crafted URL allows access to the server's filesystem, which could contain sensitive information.

Impact

An attacker could view files owned by the user running Roundup. This will never be root however, as Roundup will not run as root.

Workaround

There is no known workaround at this time. All users are encouraged to upgrade to the latest available version of Roundup.

Resolution

All Roundup users should upgrade to the latest version:

 # emerge sync
 
 # emerge -pv ">=www-apps/roundup-0.7.6"
 # emerge ">=www-apps/roundup-0.7.6"

References

Release date
August 11, 2004

Latest revision
May 22, 2006: 03

Severity
low

Exploitable
remote

Bugzilla entries