Path traversal in Gitblit
High severity
GitHub Reviewed
Published
May 22, 2022
to the GitHub Advisory Database
•
Updated Jan 27, 2023
Description
Published by the National Vulnerability Database
May 21, 2022
Published to the GitHub Advisory Database
May 22, 2022
Reviewed
May 25, 2022
Last updated
Jan 27, 2023
A Path Traversal vulnerability in Gitblit 1.9.3 can lead to reading website files via /resources//../ (e.g., followed by a WEB-INF or META-INF pathname).
References