Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2017-1000116

Опубликовано: 05 окт. 2017
Источник: debian

Описание

Mercurial prior to 4.3 did not adequately sanitize hostnames passed to ssh, leading to possible shell-injection attacks.

Пакеты

ПакетСтатусВерсия исправленияРелизТип
mercurialfixed4.3.1-1package

Примечания

  • https://www.mercurial-scm.org/wiki/WhatsNew#Mercurial_4.3_.282017-08-10.29

  • 11 patches need to be applied, the following are for 4.2:

  • https://www.mercurial-scm.org/repo/hg/rev/53224b1ffbc2

  • https://www.mercurial-scm.org/repo/hg/rev/e10745311406

  • https://www.mercurial-scm.org/repo/hg/rev/f93975a5ebe8

  • https://www.mercurial-scm.org/repo/hg/rev/f9134e96ed0f

  • https://www.mercurial-scm.org/repo/hg/rev/92b583e3e522

  • https://www.mercurial-scm.org/repo/hg/rev/08cfc4baf3ba

  • https://www.mercurial-scm.org/repo/hg/rev/55681baf4cf9

  • https://www.mercurial-scm.org/repo/hg/rev/173ecccb9ee7

  • https://www.mercurial-scm.org/repo/hg/rev/ca398a50ca00

  • https://www.mercurial-scm.org/repo/hg/rev/00a75672a9cb

  • https://www.mercurial-scm.org/repo/hg/rev/943c91326b23

  • 3.7 and 4.1 backports also available at https://bitbucket.org/atlassian/mercurial/commits/branch/sec-3.7

  • and https://bitbucket.org/octobus/mercurial-backport/branch/backport-4.1

Связанные уязвимости

CVSS3: 9.8
ubuntu
около 8 лет назад

Mercurial prior to 4.3 did not adequately sanitize hostnames passed to ssh, leading to possible shell-injection attacks.

CVSS3: 6.3
redhat
больше 8 лет назад

Mercurial prior to 4.3 did not adequately sanitize hostnames passed to ssh, leading to possible shell-injection attacks.

CVSS3: 9.8
nvd
около 8 лет назад

Mercurial prior to 4.3 did not adequately sanitize hostnames passed to ssh, leading to possible shell-injection attacks.

CVSS3: 9.8
github
больше 3 лет назад

Mercurial is vulnerable to shell injection attack

fstec
около 8 лет назад

Уязвимость программного средства управления версиями Mercurial, связанная с отсутствием мер по очистке входных данных, позволяющая нарушителю выполнить произвольные команды операционной системы