Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

redhat логотип

CVE-2018-17456

Опубликовано: 05 окт. 2018
Источник: redhat
CVSS3: 8.8
EPSS Высокий

Описание

Git before 2.14.5, 2.15.x before 2.15.3, 2.16.x before 2.16.5, 2.17.x before 2.17.2, 2.18.x before 2.18.1, and 2.19.x before 2.19.1 allows remote code execution during processing of a recursive "git clone" of a superproject if a .gitmodules file has a URL field beginning with a '-' character.

An option injection flaw has been discovered in git when it recursively clones a repository with sub-modules. A remote attacker may configure a malicious repository and trick a user into recursively cloning it, thus executing arbitrary commands on the victim's machine.

Отчет

OpenShift Container Platform (OCP) source-to-image uses the git client packaged with the OCP container images. Since RHEL7 and its associated images are impacted, source-to-image is also impacted. The atomic-openshift package running on the masters controls the code that determines the source-to-image build image in use, therefore a cluster update is required to patch this issue. Full instructions will be provided in Security Errata provided for this issue. In OCP 3.6 and earlier, source-to-image executes in a privileged container on the node. Therefore the severity of this CVE is important for these versions. OCP 3.7 and later execute source-to-image git pulls in an unprivileged init container.

Затронутые пакеты

ПлатформаПакетСостояниеРекомендацияРелиз
Red Hat Enterprise Linux 8gitNot affected
Red Hat Fuse 7camelAffected
Red Hat JBoss Fuse 6camelAffected
Red Hat JBoss Fuse Integration Service 2camelAffected
Red Hat Mobile Application Platform 4fh-scmNot affected
Red Hat Software Collectionsrh-git218-gitNot affected
Red Hat Enterprise Linux 6gitFixedRHSA-2020:031603.02.2020
Red Hat Enterprise Linux 7gitFixedRHSA-2018:340830.10.2018
Red Hat Software Collections for Red Hat Enterprise Linux 6rh-git29-gitFixedRHSA-2018:354113.11.2018
Red Hat Software Collections for Red Hat Enterprise Linux 6.7 EUSrh-git29-gitFixedRHSA-2018:354113.11.2018

Показывать по

Дополнительная информация

Статус:

Important
Дефект:
CWE-77
https://bugzilla.redhat.com/show_bug.cgi?id=1636619git: arbitrary code execution via .gitmodules

EPSS

Процентиль: 99%
0.707
Высокий

8.8 High

CVSS3

Связанные уязвимости

CVSS3: 9.8
ubuntu
около 7 лет назад

Git before 2.14.5, 2.15.x before 2.15.3, 2.16.x before 2.16.5, 2.17.x before 2.17.2, 2.18.x before 2.18.1, and 2.19.x before 2.19.1 allows remote code execution during processing of a recursive "git clone" of a superproject if a .gitmodules file has a URL field beginning with a '-' character.

CVSS3: 9.8
nvd
около 7 лет назад

Git before 2.14.5, 2.15.x before 2.15.3, 2.16.x before 2.16.5, 2.17.x before 2.17.2, 2.18.x before 2.18.1, and 2.19.x before 2.19.1 allows remote code execution during processing of a recursive "git clone" of a superproject if a .gitmodules file has a URL field beginning with a '-' character.

CVSS3: 9.8
debian
около 7 лет назад

Git before 2.14.5, 2.15.x before 2.15.3, 2.16.x before 2.16.5, 2.17.x ...

suse-cvrf
почти 7 лет назад

Security update for libgit2

suse-cvrf
около 7 лет назад

Security update for git

EPSS

Процентиль: 99%
0.707
Высокий

8.8 High

CVSS3