Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

redhat логотип

CVE-2017-12836

Опубликовано: 10 авг. 2017
Источник: redhat
CVSS3: 5

Описание

CVS 1.12.x, when configured to use SSH for remote repositories, might allow remote attackers to execute arbitrary code via a repository URL with a crafted hostname, as demonstrated by "-oProxyCommand=id;localhost:/bar."

Отчет

Red Hat Product Security has rated this issue as having Moderate security impact. This issue is not currently planned to be addressed in future updates. For additional information, refer to the Issue Severity Classification: https://access.redhat.com/security/updates/classification/.

Затронутые пакеты

ПлатформаПакетСостояниеРекомендацияРелиз
Red Hat Enterprise Linux 5cvsWill not fix
Red Hat Enterprise Linux 6cvsWill not fix
Red Hat Enterprise Linux 7cvsWill not fix

Показывать по

Дополнительная информация

Статус:

Moderate
Дефект:
CWE-77
https://bugzilla.redhat.com/show_bug.cgi?id=1480800cvs: Command injection via malicious ssh URLs

5 Medium

CVSS3

Связанные уязвимости

CVSS3: 7.5
ubuntu
больше 8 лет назад

CVS 1.12.x, when configured to use SSH for remote repositories, might allow remote attackers to execute arbitrary code via a repository URL with a crafted hostname, as demonstrated by "-oProxyCommand=id;localhost:/bar."

CVSS3: 7.5
nvd
больше 8 лет назад

CVS 1.12.x, when configured to use SSH for remote repositories, might allow remote attackers to execute arbitrary code via a repository URL with a crafted hostname, as demonstrated by "-oProxyCommand=id;localhost:/bar."

CVSS3: 7.5
debian
больше 8 лет назад

CVS 1.12.x, when configured to use SSH for remote repositories, might ...

suse-cvrf
больше 8 лет назад

Security update for cvs

suse-cvrf
больше 8 лет назад

Security update for cvs

5 Medium

CVSS3