webcheckout in myrepos through 1.20171231 does not sanitize URLs that are passed to git clone, allowing a malicious website operator or a MitM attacker to take advantage of it for arbitrary code execution, as demonstrated by an "ext::sh -c" attack or an option injection attack.
References
Link | Resource |
---|---|
https://bugs.debian.org/840014 | Exploit Patch Third Party Advisory |
https://bugs.debian.org/840014 | Exploit Patch Third Party Advisory |
Configurations
History
21 Nov 2024, 04:11
Type | Values Removed | Values Added |
---|---|---|
References | () https://bugs.debian.org/840014 - Exploit, Patch, Third Party Advisory |
Information
Published : 2018-02-14 15:29
Updated : 2024-11-21 04:11
NVD link : CVE-2018-7032
Mitre link : CVE-2018-7032
CVE.ORG link : CVE-2018-7032
JSON object : View
Products Affected
myrepos_project
- myrepos
CWE
CWE-74
Improper Neutralization of Special Elements in Output Used by a Downstream Component ('Injection')