7.5
CVSSv2

CVE-2013-7392

Published: 22/07/2014 Updated: 22/07/2014
CVSS v2 Base Score: 7.5 | Impact Score: 6.4 | Exploitability Score: 10
VMScore: 760
Vector: AV:N/AC:L/Au:N/C:P/I:P/A:P

Vulnerability Summary

Gitlist allows remote malicious users to execute arbitrary commands via shell metacharacters in a file name to Source/.

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

gitlist gitlist -

Exploits

from commands import getoutput import urllib import sys """ Exploit Title: Gitlist <= 040 anonymous RCE Date: 06/20/2014 Author: drone (@dronesec) Vendor Homepage: gitlistorg/ Software link: s3amazonawscom/gitlist/gitlist-040targz Version: <= 040 Fixed in: 050 Tested on: Debian 7 More information: hatriot ...
## # This module requires Metasploit: http//metasploitcom/download # Current source: githubcom/rapid7/metasploit-framework ## require 'msf/core' class Metasploit3 < Msf::Exploit::Remote Rank = ExcellentRanking include Msf::Exploit::Remote::HttpClient def initialize(info = {}) super(update_info(info, 'Name' ...