Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

redhat логотип

CVE-2017-1000117

Опубликовано: 10 авг. 2017
Источник: redhat
CVSS3: 6.3

Описание

A malicious third-party can give a crafted "ssh://..." URL to an unsuspecting victim, and an attempt to visit the URL can result in any program that exists on the victim's machine being executed. Such a URL could be placed in the .gitmodules file of a malicious project, and an unsuspecting victim could be tricked into running "git clone --recurse-submodules" to trigger the vulnerability.

A shell command injection flaw related to the handling of "ssh" URLs has been discovered in Git. An attacker could use this flaw to execute shell commands with the privileges of the user running the Git client, for example, when performing a "clone" action on a malicious repository or a legitimate repository containing a malicious commit.

Затронутые пакеты

ПлатформаПакетСостояниеРекомендацияРелиз
Red Hat BPM Suite 6jgitNot affected
Red Hat JBoss A-MQ 6fabric8Not affected
Red Hat JBoss BRMS 6jgitNot affected
Red Hat JBoss Data Virtualization 6jgitNot affected
Red Hat JBoss Fuse 6camelNot affected
Red Hat JBoss Fuse Service Works 6jgitNot affected
Red Hat Enterprise Linux 6gitFixedRHSA-2017:248516.08.2017
Red Hat Enterprise Linux 7gitFixedRHSA-2017:248416.08.2017
Red Hat Mobile Application Platform 4.5fh-system-dump-toolFixedRHSA-2017:267418.09.2017
Red Hat Mobile Application Platform 4.5fpingFixedRHSA-2017:267418.09.2017

Показывать по

Дополнительная информация

Статус:

Important
Дефект:
CWE-20
https://bugzilla.redhat.com/show_bug.cgi?id=1480386git: Command injection via malicious ssh URLs

6.3 Medium

CVSS3

Связанные уязвимости

CVSS3: 8.8
ubuntu
около 8 лет назад

A malicious third-party can give a crafted "ssh://..." URL to an unsuspecting victim, and an attempt to visit the URL can result in any program that exists on the victim's machine being executed. Such a URL could be placed in the .gitmodules file of a malicious project, and an unsuspecting victim could be tricked into running "git clone --recurse-submodules" to trigger the vulnerability.

CVSS3: 8.8
nvd
около 8 лет назад

A malicious third-party can give a crafted "ssh://..." URL to an unsuspecting victim, and an attempt to visit the URL can result in any program that exists on the victim's machine being executed. Such a URL could be placed in the .gitmodules file of a malicious project, and an unsuspecting victim could be tricked into running "git clone --recurse-submodules" to trigger the vulnerability.

CVSS3: 8.8
debian
около 8 лет назад

A malicious third-party can give a crafted "ssh://..." URL to an unsus ...

suse-cvrf
около 8 лет назад

Security update for git

suse-cvrf
около 8 лет назад

Security update for git

6.3 Medium

CVSS3