A malicious third-party can give a crafted "ssh://..." URL to an unsuspecting victim, and an attempt to visit the URL can result in any program that exists on the victim's machine being executed. Such a URL could be placed in the .gitmodules file of a malicious project, and an unsuspecting victim could be tricked into running "git clone --recurse-submodules" to trigger the vulnerability.
Metrics
Affected Vendors & Products
References
History
No history.
MITRE
Status: PUBLISHED
Assigner: mitre
Published: 2017-10-04T01:00:00
Updated: 2024-08-05T21:53:06.692Z
Reserved: 2017-10-03T00:00:00
Link: CVE-2017-1000117
Vulnrichment
No data.
NVD
Status : Modified
Published: 2017-10-05T01:29:04.650
Modified: 2024-11-21T03:04:12.373
Link: CVE-2017-1000117
Redhat