webcheckout in myrepos through 1.20171231 does not sanitize URLs that are passed to git clone, allowing a malicious website operator or a MitM attacker to take advantage of it for arbitrary code execution, as demonstrated by an "ext::sh -c" attack or an option injection attack.
References
Link | Resource |
---|---|
https://bugs.debian.org/840014 | Exploit Patch Third Party Advisory |
Configurations
Information
Published : 2018-02-14 07:29
Updated : 2020-08-24 10:37
NVD link : CVE-2018-7032
Mitre link : CVE-2018-7032
JSON object : View
CWE
CWE-74
Improper Neutralization of Special Elements in Output Used by a Downstream Component ('Injection')
Products Affected
myrepos_project
- myrepos