Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

ubuntu логотип

CVE-2018-7032

Опубликовано: 14 фев. 2018
Источник: ubuntu
Приоритет: medium
CVSS2: 5.1
CVSS3: 7.5

Описание

webcheckout in myrepos through 1.20171231 does not sanitize URLs that are passed to git clone, allowing a malicious website operator or a MitM attacker to take advantage of it for arbitrary code execution, as demonstrated by an "ext::sh -c" attack or an option injection attack.

РелизСтатусПримечание
artful

DNE

bionic

DNE

cosmic

DNE

devel

DNE

disco

DNE

eoan

DNE

esm-apps/xenial

not-affected

1.16
esm-infra-legacy/trusty

DNE

trusty/esm was DNE [trusty was needs-triage]
esm-infra/focal

DNE

focal

DNE

Показывать по

РелизСтатусПримечание
artful

ignored

end of life
bionic

ignored

end of standard support, was needs-triage
cosmic

ignored

end of life
devel

not-affected

1.20180726
disco

not-affected

1.20180726
eoan

not-affected

1.20180726
esm-apps/bionic

needs-triage

esm-apps/focal

not-affected

1.20180726
esm-apps/jammy

not-affected

1.20180726
esm-apps/noble

not-affected

1.20180726

Показывать по

5.1 Medium

CVSS2

7.5 High

CVSS3

Связанные уязвимости

CVSS3: 7.5
nvd
почти 8 лет назад

webcheckout in myrepos through 1.20171231 does not sanitize URLs that are passed to git clone, allowing a malicious website operator or a MitM attacker to take advantage of it for arbitrary code execution, as demonstrated by an "ext::sh -c" attack or an option injection attack.

CVSS3: 7.5
debian
почти 8 лет назад

webcheckout in myrepos through 1.20171231 does not sanitize URLs that ...

CVSS3: 7.5
github
больше 3 лет назад

webcheckout in myrepos through 1.20171231 does not sanitize URLs that are passed to git clone, allowing a malicious website operator or a MitM attacker to take advantage of it for arbitrary code execution, as demonstrated by an "ext::sh -c" attack or an option injection attack.

5.1 Medium

CVSS2

7.5 High

CVSS3