First published: Tue Sep 26 2017(Updated: )
Git before 2.10.5, 2.11.x before 2.11.4, 2.12.x before 2.12.5, 2.13.x before 2.13.6, and 2.14.x before 2.14.2 uses unsafe Perl scripts to support subcommands such as cvsserver, which allows attackers to execute arbitrary OS commands via shell metacharacters in a module name. The vulnerable code is reachable via git-shell even without CVS support.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
debian/git | 1:2.20.1-2+deb10u3 1:2.20.1-2+deb10u8 1:2.30.2-1+deb11u2 1:2.39.2-1.1 1:2.42.0-1 | |
Git Git-shell | <=2.10.4 | |
Git Git-shell | =2.11.0 | |
Git Git-shell | =2.11.1 | |
Git Git-shell | =2.11.2 | |
Git Git-shell | =2.11.3 | |
Git Git-shell | =2.12.0 | |
Git Git-shell | =2.12.1 | |
Git Git-shell | =2.12.2 | |
Git Git-shell | =2.12.3 | |
Git Git-shell | =2.12.4 | |
Git Git-shell | =2.13.0 | |
Git Git-shell | =2.13.1 | |
Git Git-shell | =2.13.2 | |
Git Git-shell | =2.13.3 | |
Git Git-shell | =2.13.4 | |
Git Git-shell | =2.13.5 | |
Git Git-shell | =2.14.0 | |
Git Git-shell | =2.14.1 | |
Debian | =8.0 | |
Debian | =9.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2017-14867 has a high severity rating due to the potential for arbitrary OS command execution.
To fix CVE-2017-14867, upgrade Git to version 2.10.5 or later.
CVE-2017-14867 affects Git versions before 2.10.5, 2.11.x before 2.11.4, 2.12.x before 2.12.5, 2.13.x before 2.13.6, and 2.14.x before 2.14.2.
Yes, CVE-2017-14867 can potentially be exploited remotely if an attacker has access to input the module name.
If you cannot upgrade immediately, limit the use of vulnerable subcommands and monitor logs for unusual activity as a temporary measure.