Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

ubuntu логотип

CVE-2018-11235

Опубликовано: 30 мая 2018
Источник: ubuntu
Приоритет: high
EPSS Средний
CVSS2: 6.8
CVSS3: 7.8

Описание

In Git before 2.13.7, 2.14.x before 2.14.4, 2.15.x before 2.15.2, 2.16.x before 2.16.4, and 2.17.x before 2.17.1, remote code execution can occur. With a crafted .gitmodules file, a malicious project can execute an arbitrary script on a machine that runs "git clone --recurse-submodules" because submodule "names" are obtained from this file, and then appended to $GIT_DIR/modules, leading to directory traversal with "../" in a name. Finally, post-checkout hooks from a submodule are executed, bypassing the intended design in which hooks are not obtained from a remote server.

РелизСтатусПримечание
artful

released

1:2.14.1-1ubuntu4.1
bionic

released

1:2.17.1-1ubuntu0.1
devel

not-affected

1:2.17.1-1ubuntu1
esm-infra-legacy/trusty

DNE

trusty/esm was DNE [trusty was released [1:1.9.1-1ubuntu0.8]]
esm-infra/bionic

released

1:2.17.1-1ubuntu0.1
esm-infra/xenial

released

1:2.7.4-0ubuntu1.4
precise/esm

DNE

trusty

released

1:1.9.1-1ubuntu0.8
trusty/esm

DNE

trusty was released [1:1.9.1-1ubuntu0.8]
upstream

released

1:2.17.1-1

Показывать по

EPSS

Процентиль: 97%
0.39682
Средний

6.8 Medium

CVSS2

7.8 High

CVSS3

Связанные уязвимости

CVSS3: 8.8
redhat
больше 7 лет назад

In Git before 2.13.7, 2.14.x before 2.14.4, 2.15.x before 2.15.2, 2.16.x before 2.16.4, and 2.17.x before 2.17.1, remote code execution can occur. With a crafted .gitmodules file, a malicious project can execute an arbitrary script on a machine that runs "git clone --recurse-submodules" because submodule "names" are obtained from this file, and then appended to $GIT_DIR/modules, leading to directory traversal with "../" in a name. Finally, post-checkout hooks from a submodule are executed, bypassing the intended design in which hooks are not obtained from a remote server.

CVSS3: 7.8
nvd
больше 7 лет назад

In Git before 2.13.7, 2.14.x before 2.14.4, 2.15.x before 2.15.2, 2.16.x before 2.16.4, and 2.17.x before 2.17.1, remote code execution can occur. With a crafted .gitmodules file, a malicious project can execute an arbitrary script on a machine that runs "git clone --recurse-submodules" because submodule "names" are obtained from this file, and then appended to $GIT_DIR/modules, leading to directory traversal with "../" in a name. Finally, post-checkout hooks from a submodule are executed, bypassing the intended design in which hooks are not obtained from a remote server.

CVSS3: 7.8
debian
больше 7 лет назад

In Git before 2.13.7, 2.14.x before 2.14.4, 2.15.x before 2.15.2, 2.16 ...

CVSS3: 7.8
github
больше 3 лет назад

In Git before 2.13.7, 2.14.x before 2.14.4, 2.15.x before 2.15.2, 2.16.x before 2.16.4, and 2.17.x before 2.17.1, remote code execution can occur. With a crafted .gitmodules file, a malicious project can execute an arbitrary script on a machine that runs "git clone --recurse-submodules" because submodule "names" are obtained from this file, and then appended to $GIT_DIR/modules, leading to directory traversal with "../" in a name. Finally, post-checkout hooks from a submodule are executed, bypassing the intended design in which hooks are not obtained from a remote server.

oracle-oval
больше 7 лет назад

ELSA-2018-1957: git security update (IMPORTANT)

EPSS

Процентиль: 97%
0.39682
Средний

6.8 Medium

CVSS2

7.8 High

CVSS3