Moderate severityNVD Advisory· Published Jun 30, 2008· Updated Apr 23, 2026
CVE-2008-2942
CVE-2008-2942
Description
Directory traversal vulnerability in patch.py in Mercurial 1.0.1 allows user-assisted attackers to modify arbitrary files via ".." (dot dot) sequences in a patch file.
Affected packages
Versions sourced from the GitHub Security Advisory.
| Package | Affected versions | Patched versions |
|---|---|---|
mercurialPyPI | < 1.0.2 | 1.0.2 |
Affected products
1Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
15- www.selenic.com/hg/rev/87c704ac92d4nvdExploitWEB
- github.com/advisories/GHSA-v2gw-x5jf-pgwvghsaADVISORY
- nvd.nist.gov/vuln/detail/CVE-2008-2942ghsaADVISORY
- lists.opensuse.org/opensuse-security-announce/2008-07/msg00006.htmlnvdWEB
- secunia.com/advisories/31108nvdWEB
- secunia.com/advisories/31110nvdWEB
- secunia.com/advisories/31167nvdWEB
- security.gentoo.org/glsa/glsa-200807-09.xmlnvdWEB
- wiki.rpath.com/Advisories:rPSA-2008-0211nvdWEB
- www.openwall.com/lists/oss-security/2008/06/30/1nvdWEB
- www.openwall.com/lists/oss-security/2008/07/01/1nvdWEB
- www.securityfocus.com/archive/1/493881/100/0/threadednvdWEB
- www.securityfocus.com/bid/30072nvdWEB
- exchange.xforce.ibmcloud.com/vulnerabilities/43551nvdWEB
- issues.rpath.com/browse/RPL-2633nvdWEB
News mentions
0No linked articles in our index yet.