CVE-2017-12836CVE-2017-12836

Affected configuration(s):

cpe:/a:gnu:cvs:1.12.1
cpe:/a:gnu:cvs:1.12.3
cpe:/a:gnu:cvs:1.12.5
cpe:/a:gnu:cvs:1.12.6
cpe:/a:gnu:cvs:1.12.7
cpe:/a:gnu:cvs:1.12.9
cpe:/a:gnu:cvs:1.12.10
cpe:/a:gnu:cvs:1.12.11
cpe:/a:gnu:cvs:1.12.12
cpe:/a:gnu:cvs:1.12.13
cpe:/o:canonical:ubuntu_linux:14.04::~~lts~~~
cpe:/o:canonical:ubuntu_linux:16.04::~~lts~~~
cpe:/o:canonical:ubuntu_linux:17.04
cpe:/o:debian:debian_linux:8.0
cpe:/o:debian:debian_linux:9.0

Date published: 2017-08-24T10:29:00.397-04:00

Date last modified: 2017-09-25T21:29:02.990-04:00

CVSS Score: 5.1

Principal attack vector: NETWORK

Complexity:  HIGH

Reference URL: http://lists.nongnu.org/archive/html/bug-cvs/2017-08/msg00000.html

Summary: CVS 1.12.x, when configured to use SSH for remote repositories, might allow remote attackers to execute arbitrary code via a repository URL with a crafted hostname, as demonstrated by “-oProxyCommand=id;localhost:/bar.”

CategoriesUncategorised

Leave a Reply

Your email address will not be published. Required fields are marked *

This site uses Akismet to reduce spam. Learn how your comment data is processed.