OS command injection in git (Alpine package)



Risk High
Patch available YES
Number of vulnerabilities 1
CVE-ID CVE-2017-1000117
CWE-ID CWE-78
Exploitation vector Network
Public exploit Public exploit code for vulnerability #1 is available.
Vulnerable software
git (Alpine package)
Operating systems & Components / Operating system package or component

Vendor Alpine Linux Development Team

Security Bulletin

This security bulletin contains one high risk vulnerability.

1) OS command injection

EUVDB-ID: #VU7889

Risk: High

CVSSv4.0: 9.3 [CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:A/U:Amber]

CVE-ID: CVE-2017-1000117

CWE-ID: CWE-78 - Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')

Exploit availability: Yes

Description

The vulnerability allows a remote attacker to execute arbitrary shell commands on the target system.

The weakness exists due to command injection flaw. A remote attacker (e.g., repository) can return a specially crafted 'ssh://' URL during 'clone' commands to execute arbitrary shell commands with privileges of the current user.

Successful exploitation of the vulnerability may result in system compromise.

Mitigation

Install update from vendor's website.

Vulnerable software versions

git (Alpine package): 2.6.7-r0 - 2.8.5-r0

CPE2.3 External links

https://git.alpinelinux.org/aports/commit/?id=e4b964504a95af49335ffad822e07612398d0a08
https://git.alpinelinux.org/aports/commit/?id=58b4a531b78ab8c0f877521a48ff6c54980277ff
https://git.alpinelinux.org/aports/commit/?id=9aba91c06a0a7c89ad811675f633b62dff12d5fd
https://git.alpinelinux.org/aports/commit/?id=9e4febcc9b8510f432426f83753baa8d7ac69873
https://git.alpinelinux.org/aports/commit/?id=41abc974b649b0839a1fe9b2f355feb8dd0fc224
https://git.alpinelinux.org/aports/commit/?id=6afe8a2fd5cf1fa95844bcb4ac67faf94610eb26
https://git.alpinelinux.org/aports/commit/?id=08a727fd449e435bfe2c49fa2b7d394877051fe5
https://git.alpinelinux.org/aports/commit/?id=f47ad914acc7b1da2a97b919f2e42ccb8b56af0c
https://git.alpinelinux.org/aports/commit/?id=b27e1b0b62c4d990e865db16886e2c6c9bb44417
https://git.alpinelinux.org/aports/commit/?id=9a5f244247667f6b4103fb1177b2cefa095f5a80
https://git.alpinelinux.org/aports/commit/?id=ced9a5e103f8e3a4a49fa25ee1c60887dd64543d


Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability. However, a fully functional exploit for this vulnerability is available.



###SIDEBAR###