OS Command Injection

Affecting git package, versions <1:2.1.4-2.1+deb8u5

Report new vulnerabilities
Do your applications use this vulnerable package? Test your applications

Overview

Git before 2.10.5, 2.11.x before 2.11.4, 2.12.x before 2.12.5, 2.13.x before 2.13.6, and 2.14.x before 2.14.2 uses unsafe Perl scripts to support subcommands such as cvsserver, which allows attackers to execute arbitrary OS commands via shell metacharacters in a module name. The vulnerable code is reachable via git-shell even without CVS support.

References

CVSS Score

8.8
high severity
  • Attack Vector
    Network
  • Attack Complexity
    Low
  • Privileges Required
    Low
  • User Interaction
    None
  • Scope
    Unchanged
  • Confidentiality
    High
  • Integrity
    High
  • Availability
    High
CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
CVE
CVE-2017-14867
CWE
CWE-78
Snyk ID
SNYK-DEBIAN8-GIT-340831
Disclosed
29 Sep, 2017
Published
29 Sep, 2017