Vulnerability Monitor

The vendors, products, and vulnerabilities you care about

CVE-2017-12836


CVS 1.12.x, when configured to use SSH for remote repositories, might allow remote attackers to execute arbitrary code via a repository URL with a crafted hostname, as demonstrated by "-oProxyCommand=id;localhost:/bar."


Published

2017-08-24T14:29:00.397

Last Modified

2025-04-20T01:37:25.860

Status

Deferred

Source

[email protected]

Severity

CVSSv3.0: 7.5 (HIGH)

CVSSv2 Vector

AV:N/AC:H/Au:N/C:P/I:P/A:P

  • Access Vector: NETWORK
  • Access Complexity: HIGH
  • Authentication: NONE
  • Confidentiality Impact: PARTIAL
  • Integrity Impact: PARTIAL
  • Availability Impact: PARTIAL
Exploitability Score

4.9

Impact Score

6.4

Weaknesses
  • Type: Primary
    NVD-CWE-noinfo

Affected Vendors & Products
Type Vendor Product Version/Range Vulnerable?
Application gnu cvs 1.12.1 Yes
Application gnu cvs 1.12.3 Yes
Application gnu cvs 1.12.5 Yes
Application gnu cvs 1.12.6 Yes
Application gnu cvs 1.12.7 Yes
Application gnu cvs 1.12.9 Yes
Application gnu cvs 1.12.10 Yes
Application gnu cvs 1.12.11 Yes
Application gnu cvs 1.12.12 Yes
Application gnu cvs 1.12.13 Yes
Operating System canonical ubuntu_linux 14.04 Yes
Operating System canonical ubuntu_linux 16.04 Yes
Operating System canonical ubuntu_linux 17.04 Yes
Operating System debian debian_linux 8.0 Yes
Operating System debian debian_linux 9.0 Yes

References