Description
webcheckout in myrepos through 1.20171231 does not sanitize URLs that are passed to git clone, allowing a malicious website operator or a MitM attacker to take advantage of it for arbitrary code execution, as demonstrated by an "ext::sh -c" attack or an option injection attack.
Analysis and contextual insights are available on OpenCVE Cloud.
Remediation
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
Advisories
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2018-18776 | webcheckout in myrepos through 1.20171231 does not sanitize URLs that are passed to git clone, allowing a malicious website operator or a MitM attacker to take advantage of it for arbitrary code execution, as demonstrated by an "ext::sh -c" attack or an option injection attack. |
References
| Link | Providers |
|---|---|
| https://bugs.debian.org/840014 |
|
History
No history.
Status: PUBLISHED
Assigner: mitre
Published:
Updated: 2024-09-16T17:28:55.857Z
Reserved: 2018-02-14T00:00:00.000Z
Link: CVE-2018-7032
No data.
Status : Modified
Published: 2018-02-14T15:29:00.333
Modified: 2024-11-21T04:11:32.630
Link: CVE-2018-7032
No data.
OpenCVE Enrichment
No data.
Weaknesses
EUVD