First published: Thu Dec 21 2017(Updated: )
GitHub Git LFS before 2.1.1 allows remote attackers to execute arbitrary commands via an ssh URL with an initial dash character in the hostname, located on a "url =" line in a .lfsconfig file within a repository.
Credit: cve@mitre.org cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
go/github.com/git-lfs/git-lfs | <2.1.1-0.20170519163204-f913f5f9c7c6 | 2.1.1-0.20170519163204-f913f5f9c7c6 |
Git Large File Storage | <2.1.1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2017-17831 is classified as a high-severity vulnerability, allowing for remote command execution.
To fix CVE-2017-17831, upgrade GitHub Git LFS to version 2.1.1 or later.
CVE-2017-17831 affects GitHub Git LFS versions prior to 2.1.1.
Yes, CVE-2017-17831 can be exploited remotely through malicious SSH URLs in configuration files.
Exploitation of CVE-2017-17831 can lead to the execution of arbitrary commands on the affected system.