CVS 1.12.x, when configured to use SSH for remote repositories, might allow remote attackers to execute arbitrary code via a repository URL with a crafted hostname, as demonstrated by "-oProxyCommand=id;localhost:/bar."
2017-08-24T14:29:00.397
2025-04-20T01:37:25.860
Deferred
CVSSv3.0: 7.5 (HIGH)
AV:N/AC:H/Au:N/C:P/I:P/A:P
4.9
6.4
Type | Vendor | Product | Version/Range | Vulnerable? |
---|---|---|---|---|
Application | gnu | cvs | 1.12.1 | Yes |
Application | gnu | cvs | 1.12.3 | Yes |
Application | gnu | cvs | 1.12.5 | Yes |
Application | gnu | cvs | 1.12.6 | Yes |
Application | gnu | cvs | 1.12.7 | Yes |
Application | gnu | cvs | 1.12.9 | Yes |
Application | gnu | cvs | 1.12.10 | Yes |
Application | gnu | cvs | 1.12.11 | Yes |
Application | gnu | cvs | 1.12.12 | Yes |
Application | gnu | cvs | 1.12.13 | Yes |
Operating System | canonical | ubuntu_linux | 14.04 | Yes |
Operating System | canonical | ubuntu_linux | 16.04 | Yes |
Operating System | canonical | ubuntu_linux | 17.04 | Yes |
Operating System | debian | debian_linux | 8.0 | Yes |
Operating System | debian | debian_linux | 9.0 | Yes |