CVE-2017-14867

HIGH

Description

Git before 2.10.5, 2.11.x before 2.11.4, 2.12.x before 2.12.5, 2.13.x before 2.13.6, and 2.14.x before 2.14.2 uses unsafe Perl scripts to support subcommands such as cvsserver, which allows attackers to execute arbitrary OS commands via shell metacharacters in a module name. The vulnerable code is reachable via git-shell even without CVS support.

References

http://www.openwall.com/lists/oss-security/2017/09/26/9

http://www.securityfocus.com/bid/101060

http://www.securitytracker.com/id/1039431

https://bugs.debian.org/876854

https://lists.debian.org/debian-security-announce/2017/msg00246.html

https://public-inbox.org/git/[email protected]/T/#u

https://www.debian.org/security/2017/dsa-3984

Details

Source: MITRE

Published: 2017-09-29

Updated: 2017-10-11

Type: CWE-20

Risk Information

CVSS v2.0

Base Score: 9

Vector: AV:N/AC:L/Au:S/C:C/I:C/A:C

Impact Score: 10

Exploitability Score: 8

Severity: HIGH

CVSS v3.0

Base Score: 8.8

Vector: CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

Impact Score: 5.9

Exploitability Score: 2.8

Severity: HIGH