Vulnerability CVE-2017-1000117


Published: 2017-10-04   Modified: 2017-10-05

Description:
A malicious third-party can give a crafted "ssh://..." URL to an unsuspecting victim, and an attempt to visit the URL can result in any program that exists on the victim's machine being executed. Such a URL could be placed in the .gitmodules file of a malicious project, and an unsuspecting victim could be tricked into running "git clone --recurse-submodules" to trigger the vulnerability.

See advisories in our WLB2 database:
Topic
Author
Date
High
Malicious GIT HTTP Server
Anonymous
31.08.2017

Type:

CWE-601

(URL Redirection to Untrusted Site ('Open Redirect'))

CVSS2 => (AV:N/AC:M/Au:N/C:P/I:P/A:P)

CVSS Base Score
Impact Subscore
Exploitability Subscore
6.8/10
6.4/10
8.6/10
Exploit range
Attack complexity
Authentication
Remote
Medium
No required
Confidentiality impact
Integrity impact
Availability impact
Partial
Partial
Partial
Affected software
Git-scm -> GIT 

 References:
http://www.debian.org/security/2017/dsa-3934
http://www.securityfocus.com/bid/100283
http://www.securitytracker.com/id/1039131
https://access.redhat.com/errata/RHSA-2017:2484
https://access.redhat.com/errata/RHSA-2017:2485
https://access.redhat.com/errata/RHSA-2017:2491
https://access.redhat.com/errata/RHSA-2017:2674
https://access.redhat.com/errata/RHSA-2017:2675
https://security.gentoo.org/glsa/201709-10
https://support.apple.com/HT208103
https://www.exploit-db.com/exploits/42599/
https://www.mail-archive.com/linux-kernel@vger.kernel.org/msg1466490.html

Copyright 2024, cxsecurity.com

 

Back to Top