vendor:
Git
by:
Joernchen
7.5
CVSS
HIGH
Remote Code Execution
78
CWE
Product Name: Git
Affected Version From: N/A
Affected Version To: N/A
Patch Exists: YES
Related CWE: N/A
CPE: N/A
Metasploit:
N/A
Other Scripts:
N/A
Platforms Tested: N/A
2018
CVE-2018-17456
The vulnerability is caused by the fact that the colon character in the path of the .gitmodules file allows the payload script to be executed. The path will end up as the repository URL in the subsequent clone operation, with the actual URL from .gitmodules being interpreted as the -u argument.
Mitigation:
The vulnerability is fixed in Git 2.19.1.