cgit < 1.2.1 - 'cgit_clone_objects()' Directory Traversal

EDB-ID: 45148 Author: Google Security Research Published: 2018-08-03
CVE: N/A Type: Webapps Platform: CGI
Aliases: N/A Advisory/Source: N/A Tags: Traversal
E-DB Verified: Verified Exploit: Download Exploit Code Download / View Raw Vulnerable App: N/A
There is a directory traversal vulnerability in cgit_clone_objects(), reachable when the configuration flag enable-http-clone is set to 1 (default):

void cgit_clone_objects(void)
    if (!ctx.qry.path) {
        cgit_print_error_page(400, "Bad request", "Bad request");

    if (!strcmp(ctx.qry.path, "info/packs")) {

    send_file(git_path("objects/%s", ctx.qry.path));

send_file() is a function that simply sends the data stored at the given filesystem path out over the network.
git_path() partially rewrites the provided path and e.g. prepends the base path of the repository, but it does not sanitize the provided path to prevent directory traversal.

ctx.qry.path can come from querystring_cb(), which takes unescaped data from the querystring. To trigger this case:

$ curl

Related Exploits

Other Possible E-DB Search Terms: cgit < 1.2.1,  cgit
Date D V Title Author
1999-11-15 Verified Antelope Software W4-Server 2.6 a/Win32 - 'Cgitest.exe' Remote Buffer OverflowUNYUN
2003-07-21 Verified Savant Web Server 3.1 - CGITest.HTML Cross-Site Scriptingdr_insane