The web interface in git (gitweb) 1.5.x before 1.5.6 allows remote attackers to execute arbitrary commands via shell metacharacters related to (1) git_snapshot and (2) git_object.
References
Configurations
Configuration 1 (hide)
|
History
21 Nov 2024, 00:54
Type | Values Removed | Values Added |
---|---|---|
References | () http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=512330 - | |
References | () http://lists.opensuse.org/opensuse-security-announce/2009-01/msg00002.html - | |
References | () http://repo.or.cz/w/git.git?a=commitdiff%3Bh=516381d5 - | |
References | () http://secunia.com/advisories/33964 - Vendor Advisory | |
References | () http://secunia.com/advisories/34194 - Vendor Advisory | |
References | () http://wiki.rpath.com/Advisories:rPSA-2009-0005 - | |
References | () http://www.debian.org/security/2009/dsa-1708 - | |
References | () http://www.gentoo.org/security/en/glsa/glsa-200903-15.xml - | |
References | () http://www.openwall.com/lists/oss-security/2009/01/20/1 - | |
References | () http://www.openwall.com/lists/oss-security/2009/01/21/7 - | |
References | () http://www.openwall.com/lists/oss-security/2009/01/23/2 - | |
References | () http://www.securityfocus.com/archive/1/500008/100/0/threaded - | |
References | () http://www.securityfocus.com/bid/33215 - Patch | |
References | () http://www.ubuntu.com/usn/USN-723-1 - | |
References | () http://www.vupen.com/english/advisories/2009/0175 - Vendor Advisory | |
References | () https://bugzilla.redhat.com/show_bug.cgi?id=479715 - | |
References | () https://issues.rpath.com/browse/RPL-2936 - |
Information
Published : 2009-01-13 17:00
Updated : 2024-11-21 00:54
NVD link : CVE-2008-5517
Mitre link : CVE-2008-5517
CVE.ORG link : CVE-2008-5517
JSON object : View
Products Affected
git
- git
CWE
CWE-94
Improper Control of Generation of Code ('Code Injection')