CVE-2017-1000117
Severity CVSS v4.0:
Pending analysis
Type:
CWE-601
URL Redirection to Untrusted Site ('Open Redirect')
Publication date:
05/10/2017
Last modified:
20/04/2025
Description
A malicious third-party can give a crafted "ssh://..." URL to an unsuspecting victim, and an attempt to visit the URL can result in any program that exists on the victim's machine being executed. Such a URL could be placed in the .gitmodules file of a malicious project, and an unsuspecting victim could be tricked into running "git clone --recurse-submodules" to trigger the vulnerability.
Impact
Base Score 3.x
8.80
Severity 3.x
HIGH
Base Score 2.0
6.80
Severity 2.0
MEDIUM
Vulnerable products and versions
CPE | From | Up to |
---|---|---|
cpe:2.3:a:git-scm:git:*:*:*:*:*:*:*:* | 2.7.5 (including) | |
cpe:2.3:a:git-scm:git:2.8.0:*:*:*:*:*:*:* | ||
cpe:2.3:a:git-scm:git:2.8.0:rc0:*:*:*:*:*:* | ||
cpe:2.3:a:git-scm:git:2.8.0:rc1:*:*:*:*:*:* | ||
cpe:2.3:a:git-scm:git:2.8.0:rc2:*:*:*:*:*:* | ||
cpe:2.3:a:git-scm:git:2.8.0:rc3:*:*:*:*:*:* | ||
cpe:2.3:a:git-scm:git:2.8.1:*:*:*:*:*:*:* | ||
cpe:2.3:a:git-scm:git:2.8.2:*:*:*:*:*:*:* | ||
cpe:2.3:a:git-scm:git:2.8.3:*:*:*:*:*:*:* | ||
cpe:2.3:a:git-scm:git:2.8.4:*:*:*:*:*:*:* | ||
cpe:2.3:a:git-scm:git:2.8.5:*:*:*:*:*:*:* | ||
cpe:2.3:a:git-scm:git:2.9.0:*:*:*:*:*:*:* | ||
cpe:2.3:a:git-scm:git:2.9.0:rc0:*:*:*:*:*:* | ||
cpe:2.3:a:git-scm:git:2.9.0:rc1:*:*:*:*:*:* | ||
cpe:2.3:a:git-scm:git:2.9.0:rc2:*:*:*:*:*:* |
To consult the complete list of CPE names with products and versions, see this page
References to Advisories, Solutions, and Tools
- http://www.debian.org/security/2017/dsa-3934
- http://www.securityfocus.com/bid/100283
- http://www.securitytracker.com/id/1039131
- https://access.redhat.com/errata/RHSA-2017:2484
- https://access.redhat.com/errata/RHSA-2017:2485
- https://access.redhat.com/errata/RHSA-2017:2491
- https://access.redhat.com/errata/RHSA-2017:2674
- https://access.redhat.com/errata/RHSA-2017:2675
- https://security.gentoo.org/glsa/201709-10
- https://support.apple.com/HT208103
- https://www.exploit-db.com/exploits/42599/
- https://www.mail-archive.com/linux-kernel%40vger.kernel.org/msg1466490.html
- http://www.debian.org/security/2017/dsa-3934
- http://www.securityfocus.com/bid/100283
- http://www.securitytracker.com/id/1039131
- https://access.redhat.com/errata/RHSA-2017:2484
- https://access.redhat.com/errata/RHSA-2017:2485
- https://access.redhat.com/errata/RHSA-2017:2491
- https://access.redhat.com/errata/RHSA-2017:2674
- https://access.redhat.com/errata/RHSA-2017:2675
- https://security.gentoo.org/glsa/201709-10
- https://support.apple.com/HT208103
- https://www.exploit-db.com/exploits/42599/
- https://www.mail-archive.com/linux-kernel%40vger.kernel.org/msg1466490.html