### [CVE-2018-17456](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-17456) ![](https://img.shields.io/static/v1?label=Product&message=n%2Fa&color=blue) ![](https://img.shields.io/static/v1?label=Version&message=n%2Fa&color=blue) ![](https://img.shields.io/static/v1?label=Vulnerability&message=n%2Fa&color=brighgreen) ### Description Git before 2.14.5, 2.15.x before 2.15.3, 2.16.x before 2.16.5, 2.17.x before 2.17.2, 2.18.x before 2.18.1, and 2.19.x before 2.19.1 allows remote code execution during processing of a recursive "git clone" of a superproject if a .gitmodules file has a URL field beginning with a '-' character. ### POC #### Reference - http://packetstormsecurity.com/files/152173/Sourcetree-Git-Arbitrary-Code-Execution-URL-Handling.html - http://packetstormsecurity.com/files/152173/Sourcetree-Git-Arbitrary-Code-Execution-URL-Handling.html - https://www.exploit-db.com/exploits/45548/ - https://www.exploit-db.com/exploits/45548/ - https://www.exploit-db.com/exploits/45631/ - https://www.exploit-db.com/exploits/45631/ #### Github - https://github.com/0xT11/CVE-POC - https://github.com/2222jin/git - https://github.com/799600966/CVE-2018-17456 - https://github.com/849598973/- - https://github.com/ARPSyndicate/cvemon - https://github.com/AnonymKing/CVE-2017-1000117 - https://github.com/AnonymKing/CVE-2018-17456 - https://github.com/KorayAgaya/TrivyWeb - https://github.com/Mohzeela/external-secret - https://github.com/NoeliaToledano/Penetration-Testing - https://github.com/SamP10/VulnerableDockerfile - https://github.com/back2zero/GIT_CVE_2018_17456 - https://github.com/dead5nd/- - https://github.com/jiahuiLeee/test - https://github.com/matlink/CVE-2018-17456 - https://github.com/nkwejj/CVE-2018-17456 - https://github.com/shpik-kr/CVE-2018-17456 - https://github.com/siddharthraopotukuchi/trivy - https://github.com/simiyo/trivy - https://github.com/t31m0/Vulnerability-Scanner-for-Containers - https://github.com/umahari/security - https://github.com/zhengjim/loophole