Fossil before 2.10.2, 2.11.x before 2.11.2, and 2.12.x before 2.12.1 allows remote authenticated users to execute arbitrary code. An attacker must have check-in privileges on the repository.
2020-08-25T14:15:16.793
2024-11-21T05:15:09.290
Modified
CVSSv3.1: 8.8 (HIGH)
AV:N/AC:L/Au:S/C:P/I:P/A:P
8.0
6.4
Type | Vendor | Product | Version/Range | Vulnerable? |
---|---|---|---|---|
Application | fossil-scm | fossil | < 2.10.2 | Yes |
Application | fossil-scm | fossil | < 2.11.2 | Yes |
Application | fossil-scm | fossil | < 2.12.1 | Yes |
Operating System | fedoraproject | fedora | 32 | Yes |
Operating System | fedoraproject | fedora | 33 | Yes |
Application | opensuse | backports_sle | 15.0 | Yes |
Application | opensuse | backports_sle | 15.0 | Yes |
Operating System | opensuse | leap | 15.1 | Yes |
Operating System | opensuse | leap | 15.2 | Yes |