webcheckout in myrepos through 1.20171231 does not sanitize URLs that are passed to git clone, allowing a malicious website operator or a MitM attacker to take advantage of it for arbitrary code execution, as demonstrated by an "ext::sh -c" attack or an option injection attack.
References
Link | Resource |
---|---|
https://bugs.debian.org/840014 | Exploit Patch Third Party Advisory |
Configurations
History
No history.
Information
Published : 2018-02-14 15:29
Updated : 2020-08-24 17:37
NVD link : CVE-2018-7032
Mitre link : CVE-2018-7032
CVE.ORG link : CVE-2018-7032
JSON object : View
Products Affected
myrepos_project
- myrepos
CWE
CWE-74
Improper Neutralization of Special Elements in Output Used by a Downstream Component ('Injection')