Files
CVEs-PoC/2018/CVE-2018-7032.md
T
2024-06-18 02:51:15 +02:00

18 lines
729 B
Markdown

### [CVE-2018-7032](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7032)
![](https://img.shields.io/static/v1?label=Product&message=n%2Fa&color=blue)
![](https://img.shields.io/static/v1?label=Version&message=n%2Fa&color=blue)
![](https://img.shields.io/static/v1?label=Vulnerability&message=n%2Fa&color=brighgreen)
### Description
webcheckout in myrepos through 1.20171231 does not sanitize URLs that are passed to git clone, allowing a malicious website operator or a MitM attacker to take advantage of it for arbitrary code execution, as demonstrated by an "ext::sh -c" attack or an option injection attack.
### POC
#### Reference
- https://bugs.debian.org/840014
#### Github
No PoCs found on GitHub currently.