Description
CVS 1.12.x, when configured to use SSH for remote repositories, might allow remote attackers to execute arbitrary code via a repository URL with a crafted hostname, as demonstrated by "-oProxyCommand=id;localhost:/bar."
Analysis and contextual insights are available on OpenCVE Cloud.
Remediation
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
Advisories
| Source | ID | Title |
|---|---|---|
Debian DLA |
DLA-1056-1 | cvs security update |
Debian DLA |
DLA-1144-1 | git-annex security update |
Debian DLA |
DLA-1495-1 | git-annex security update |
Debian DSA |
DSA-3940-1 | cvs security update |
EUVD |
EUVD-2017-4373 | CVS 1.12.x, when configured to use SSH for remote repositories, might allow remote attackers to execute arbitrary code via a repository URL with a crafted hostname, as demonstrated by "-oProxyCommand=id;localhost:/bar." |
Ubuntu USN |
USN-3399-1 | cvs vulnerability |
References
History
Sun, 13 Jul 2025 13:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
epss
|
epss
|
Status: PUBLISHED
Assigner: mitre
Published:
Updated: 2024-08-05T18:51:06.827Z
Reserved: 2017-08-11T00:00:00.000Z
Link: CVE-2017-12836
No data.
Status : Modified
Published: 2017-08-24T14:29:00.397
Modified: 2026-05-13T00:24:29.033
Link: CVE-2017-12836
OpenCVE Enrichment
No data.
Weaknesses
Debian DLA
Debian DSA
EUVD
Ubuntu USN