vendor:
Git
by:
joernchen and Jeff King
9.8
CVSS
CRITICAL
Arbitrary Code Execution
78
CWE
Product Name: Git
Affected Version From: 2.17.2
Affected Version To: 2.19.1
Patch Exists: YES
Related CWE: CVE-2018-17456
CPE: N/A
Metasploit:
https://www.rapid7.com/db/vulnerabilities/oracle-solaris-cve-2018-17456/, https://www.rapid7.com/db/vulnerabilities/alpine-linux-cve-2018-17456/, https://www.rapid7.com/db/vulnerabilities/redhat_linux-cve-2018-17456/, https://www.rapid7.com/db/vulnerabilities/huawei-euleros-2_0_sp2-cve-2018-17456/, https://www.rapid7.com/db/vulnerabilities/huawei-euleros-2_0_sp3-cve-2018-17456/, https://www.rapid7.com/db/vulnerabilities/huawei-euleros-2_0_sp5-cve-2018-17456/, https://www.rapid7.com/db/vulnerabilities/amazon-linux-ami-2-cve-2018-17456/, https://www.rapid7.com/db/vulnerabilities/amazon_linux-cve-2018-17456/, https://www.rapid7.com/db/vulnerabilities/suse-cve-2018-17456/, https://www.rapid7.com/db/vulnerabilities/freebsd-cve-2018-17456/, https://www.rapid7.com/db/vulnerabilities/oracle_linux-cve-2018-17456/, https://www.rapid7.com/db/modules/exploit/multi/http/git_submodule_url_exec/, https://www.rapid7.com/db/vulnerabilities/debian-cve-2018-17456/, https://www.rapid7.com/db/vulnerabilities/ubuntu-cve-2018-17456/, https://www.rapid7.com/db/vulnerabilities/centos_linux-cve-2018-17456/
Other Scripts:
N/A
Platforms Tested: Windows, Linux, Mac
2018
Security Flaw in Git
When running 'git clone --recurse-submodules', Git parses the supplied .gitmodules file for a URL field and blindly passes it as an argument to a 'git clone' subprocess. If the URL field is set to a string that begins with a dash, this 'git clone' subprocess interprets the URL as an option. This can lead to executing an arbitrary script shipped in the superproject as the user who ran 'git clone'.
Mitigation:
Upgrade to the latest version of Git, and use the 'fsck' check to detect malicious repository content when fetching or accepting a push.