mirror of
https://github.com/0xMarcio/cve.git
synced 2025-05-28 01:04:30 +00:00
2.0 KiB
2.0 KiB
CVE-2018-17456
Description
Git before 2.14.5, 2.15.x before 2.15.3, 2.16.x before 2.16.5, 2.17.x before 2.17.2, 2.18.x before 2.18.1, and 2.19.x before 2.19.1 allows remote code execution during processing of a recursive "git clone" of a superproject if a .gitmodules file has a URL field beginning with a '-' character.
POC
Reference
- http://packetstormsecurity.com/files/152173/Sourcetree-Git-Arbitrary-Code-Execution-URL-Handling.html
- http://packetstormsecurity.com/files/152173/Sourcetree-Git-Arbitrary-Code-Execution-URL-Handling.html
- https://www.exploit-db.com/exploits/45548/
- https://www.exploit-db.com/exploits/45548/
- https://www.exploit-db.com/exploits/45631/
- https://www.exploit-db.com/exploits/45631/
Github
- https://github.com/0xT11/CVE-POC
- https://github.com/2222jin/git
- https://github.com/799600966/CVE-2018-17456
- https://github.com/849598973/-
- https://github.com/ARPSyndicate/cvemon
- https://github.com/AnonymKing/CVE-2017-1000117
- https://github.com/AnonymKing/CVE-2018-17456
- https://github.com/KorayAgaya/TrivyWeb
- https://github.com/Mohzeela/external-secret
- https://github.com/NoeliaToledano/Penetration-Testing
- https://github.com/SamP10/VulnerableDockerfile
- https://github.com/back2zero/GIT_CVE_2018_17456
- https://github.com/dead5nd/-
- https://github.com/jiahuiLeee/test
- https://github.com/matlink/CVE-2018-17456
- https://github.com/nkwejj/CVE-2018-17456
- https://github.com/shpik-kr/CVE-2018-17456
- https://github.com/siddharthraopotukuchi/trivy
- https://github.com/simiyo/trivy
- https://github.com/t31m0/Vulnerability-Scanner-for-Containers
- https://github.com/umahari/security
- https://github.com/zhengjim/loophole