{"id":"UBUNTU-CVE-2018-20683","details":"commands/rsync in Gitolite before 3.6.11, if .gitolite.rc enables rsync, mishandles the rsync command line, which allows attackers to have a \"bad\" impact by triggering use of an option other than -v, -n, -q, or -P.","modified":"2025-10-24T04:47:18Z","published":"2019-01-10T01:29:00Z","upstream":["CVE-2018-20683"],"references":[{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2018-20683"},{"type":"REPORT","url":"https://github.com/sitaramc/gitolite/commit/5df2b817255ee919991da6c310239e08c8fcc1ae"},{"type":"REPORT","url":"https://groups.google.com/forum/#!topic/gitolite-announce/6xbjjmpLePQ"},{"type":"REPORT","url":"https://bugs.debian.org/918849"},{"type":"REPORT","url":"https://github.com/sitaramc/gitolite/blob/master/CHANGELOG"},{"type":"REPORT","url":"https://www.cve.org/CVERecord?id=CVE-2018-20683"}],"affected":[{"package":{"name":"gitolite3","ecosystem":"Ubuntu:16.04:LTS","purl":"pkg:deb/ubuntu/gitolite3@3.6.4-1?arch=source&distro=xenial"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"}]}],"versions":["3.6.3-1","3.6.4-1"],"ecosystem_specific":{"binaries":[{"binary_version":"3.6.4-1","binary_name":"gitolite3"}]},"database_specific":{"source":"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/cve/2018/UBUNTU-CVE-2018-20683.json"}},{"package":{"name":"gitolite3","ecosystem":"Ubuntu:18.04:LTS","purl":"pkg:deb/ubuntu/gitolite3@3.6.7-2?arch=source&distro=bionic"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"}]}],"versions":["3.6.7-2"],"ecosystem_specific":{"binaries":[{"binary_version":"3.6.7-2","binary_name":"gitolite3"}]},"database_specific":{"source":"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/cve/2018/UBUNTU-CVE-2018-20683.json"}}],"schema_version":"1.7.3","severity":[{"type":"CVSS_V3","score":"CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H"},{"type":"Ubuntu","score":"medium"}]}