{"containers":{"cna":{"affected":[{"product":"Helix","vendor":"Adobe","versions":[{"lessThan":"1.3.1","status":"affected","version":"unspecified","versionType":"custom"}]}],"credits":[{"lang":"en","value":"This issue was discovered and reported by GHSL team member @JarLob (Jaroslav Lobačevski)."}],"datePublic":"2020-08-10T00:00:00.000Z","descriptions":[{"lang":"en","value":"The resolveRepositoryPath function doesn't properly validate user input and a malicious user may traverse to any valid Git repository outside the repoRoot. This issue may lead to unauthorized access of private Git repositories as long as the malicious user knows or brute-forces the location of the repository."}],"metrics":[{"cvssV3_1":{"attackComplexity":"HIGH","attackVector":"NETWORK","availabilityImpact":"NONE","baseScore":5.9,"baseSeverity":"MEDIUM","confidentialityImpact":"HIGH","integrityImpact":"NONE","privilegesRequired":"NONE","scope":"UNCHANGED","userInteraction":"NONE","vectorString":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N","version":"3.1"}}],"problemTypes":[{"descriptions":[{"cweId":"CWE-24","description":"CWE-24 Path Traversal: '../filedir'","lang":"en","type":"CWE"}]}],"providerMetadata":{"dateUpdated":"2020-08-14T16:48:30.000Z","orgId":"078d4453-3bcd-4900-85e6-15281da43538","shortName":"adobe"},"references":[{"tags":["x_refsource_MISC"],"url":"https://github.com/adobe/git-server/security/advisories/GHSA-cgj4-x2hh-2x93"}],"source":{"discovery":"EXTERNAL"},"title":"GHSL-2020-133: Insufficient validation of user input in resolveRepositoryPath function","x_generator":{"engine":"Vulnogram 0.0.9"},"x_legacyV4Record":{"CVE_data_meta":{"ASSIGNER":"psirt@adobe.com","DATE_PUBLIC":"2020-08-10T23:00:00.000Z","ID":"CVE-2020-9708","STATE":"PUBLIC","TITLE":"GHSL-2020-133: Insufficient validation of user input in resolveRepositoryPath function"},"affects":{"vendor":{"vendor_data":[{"product":{"product_data":[{"product_name":"Helix","version":{"version_data":[{"version_affected":"<","version_value":"1.3.1"}]}}]},"vendor_name":"Adobe"}]}},"credit":[{"lang":"eng","value":"This issue was discovered and reported by GHSL team member @JarLob (Jaroslav Lobačevski)."}],"data_format":"MITRE","data_type":"CVE","data_version":"4.0","description":{"description_data":[{"lang":"eng","value":"The resolveRepositoryPath function doesn't properly validate user input and a malicious user may traverse to any valid Git repository outside the repoRoot. This issue may lead to unauthorized access of private Git repositories as long as the malicious user knows or brute-forces the location of the repository."}]},"generator":{"engine":"Vulnogram 0.0.9"},"impact":{"cvss":{"attackComplexity":"HIGH","attackVector":"NETWORK","availabilityImpact":"NONE","baseScore":5.9,"baseSeverity":"MEDIUM","confidentialityImpact":"HIGH","integrityImpact":"NONE","privilegesRequired":"NONE","scope":"UNCHANGED","userInteraction":"NONE","vectorString":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N","version":"3.1"}},"problemtype":{"problemtype_data":[{"description":[{"lang":"eng","value":"CWE-24 Path Traversal: '../filedir'"}]}]},"references":{"reference_data":[{"name":"https://github.com/adobe/git-server/security/advisories/GHSA-cgj4-x2hh-2x93","refsource":"MISC","url":"https://github.com/adobe/git-server/security/advisories/GHSA-cgj4-x2hh-2x93"}]},"source":{"discovery":"EXTERNAL"}}},"adp":[{"providerMetadata":{"orgId":"af854a3a-2127-422b-91ae-364da2661108","shortName":"CVE","dateUpdated":"2024-08-04T10:34:39.923Z"},"title":"CVE Program Container","references":[{"tags":["x_refsource_MISC","x_transferred"],"url":"https://github.com/adobe/git-server/security/advisories/GHSA-cgj4-x2hh-2x93"}]}]},"cveMetadata":{"assignerOrgId":"078d4453-3bcd-4900-85e6-15281da43538","assignerShortName":"adobe","cveId":"CVE-2020-9708","datePublished":"2020-08-14T16:48:30.769Z","dateReserved":"2020-03-02T00:00:00.000Z","dateUpdated":"2024-09-16T16:43:25.441Z","state":"PUBLISHED"},"dataType":"CVE_RECORD","dataVersion":"5.1"}