Description
A malicious third-party can give a crafted "ssh://..." URL to an unsuspecting victim, and an attempt to visit the URL can result in any program that exists on the victim's machine being executed. Such a URL could be placed in the .gitmodules file of a malicious project, and an unsuspecting victim could be tricked into running "git clone --recurse-submodules" to trigger the vulnerability.
Analysis and contextual insights are available on OpenCVE Cloud.
Remediation
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
Advisories
| Source | ID | Title |
|---|---|---|
Debian DLA |
DLA-1068-1 | git security update |
Debian DLA |
DLA-1072-1 | mercurial security update |
Debian DLA |
DLA-1144-1 | git-annex security update |
Debian DLA |
DLA-1495-1 | git-annex security update |
Debian DSA |
DSA-3934-1 | git security update |
Ubuntu USN |
USN-3387-1 | Git vulnerability |
References
History
No history.
Status: PUBLISHED
Assigner: mitre
Published:
Updated: 2024-08-05T21:53:06.692Z
Reserved: 2017-10-03T00:00:00.000Z
Link: CVE-2017-1000117
No data.
Status : Modified
Published: 2017-10-05T01:29:04.650
Modified: 2026-05-13T00:24:29.033
Link: CVE-2017-1000117
OpenCVE Enrichment
No data.
Debian DLA
Debian DSA
Ubuntu USN