CVE-2018-7032

webcheckout in myrepos through 1.20171231 does not sanitize URLs that are passed to git clone, allowing a malicious website operator or a MitM attacker to take advantage of it for arbitrary code execution, as demonstrated by an "ext::sh -c" attack or an option injection attack.
References
Link Resource
https://bugs.debian.org/840014 Exploit Patch Third Party Advisory
https://bugs.debian.org/840014 Exploit Patch Third Party Advisory
Configurations

Configuration 1 (hide)

cpe:2.3:a:myrepos_project:myrepos:*:*:*:*:*:*:*:*

History

21 Nov 2024, 04:11

Type Values Removed Values Added
References () https://bugs.debian.org/840014 - Exploit, Patch, Third Party Advisory () https://bugs.debian.org/840014 - Exploit, Patch, Third Party Advisory

Information

Published : 2018-02-14 15:29

Updated : 2024-11-21 04:11


NVD link : CVE-2018-7032

Mitre link : CVE-2018-7032

CVE.ORG link : CVE-2018-7032


JSON object : View

Products Affected

myrepos_project

  • myrepos
CWE
CWE-74

Improper Neutralization of Special Elements in Output Used by a Downstream Component ('Injection')