Apple Xcode < 6.2 beta 3 .git/config Command Execution (Mac OS X) (deprecated)

Medium Nessus Plugin ID 80828


This plugin has been deprecated.


The remote Mac OS X host has a version of Apple Xcode prior to 6.2 beta 3. It is, therefore, affected by a remote command execution vulnerability when processing git trees in a case-insensitive or case-normalizing file system. A remote attacker, using a specially crafted git tree, can overwrite a user's '.git/config' file when the user clones or checks out a repository, allowing arbitrary command execution.

This plugin has been deprecated. It detects Xcode installations vulnerable to CVE-2014-9390, and was created before Apple released a security update to fix this vulnerability. On March 9, 2015, a security update for Xcode has been released. The update fixes multiple vulnerabilities (including CVE-2014-9390). A separate plugin (ID 81758) has been created to detect that update. That plugin should be used instead of this one.



See Also

Plugin Details

Severity: Medium

ID: 80828

File Name: macosx_xcode_git.nasl

Version: $Revision: 1.4 $

Type: local

Agent: macosx

Published: 2015/01/19

Modified: 2015/03/11

Dependencies: 61412

Risk Information

Risk Factor: Medium


Base Score: 6.8

Temporal Score: 5.9

Vector: CVSS2#AV:N/AC:M/Au:N/C:P/I:P/A:P

Temporal Vector: CVSS2#E:ND/RL:OF/RC:C

Vulnerability Information

CPE: cpe:/a:apple:xcode

Required KB Items: Host/local_checks_enabled, Host/MacOSX/Version, installed_sw/Apple Xcode

Exploit Available: true

Exploit Ease: Exploits are available

Patch Publication Date: 2014/12/18

Vulnerability Publication Date: 2014/12/18

Exploitable With

Core Impact

Metasploit (Malicious Git and Mercurial HTTP Server For CVE-2014-9390)

Reference Information

CVE: CVE-2014-9390

BID: 71732

OSVDB: 116041

APPLE-SA: APPLE-SA-2014-12-18-1