7.5
CVSSv3

CVE-2017-12836

Published: 24/08/2017 Updated: 03/10/2019
CVSS v2 Base Score: 5.1 | Impact Score: 6.4 | Exploitability Score: 4.9
CVSS v3 Base Score: 7.5 | Impact Score: 5.9 | Exploitability Score: 1.6
VMScore: 454
Vector: AV:N/AC:H/Au:N/C:P/I:P/A:P

Vulnerability Summary

CVS 1.12.x, when configured to use SSH for remote repositories, might allow remote malicious users to execute arbitrary code via a repository URL with a crafted hostname, as demonstrated by "-oProxyCommand=id;localhost:/bar."

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

gnu cvs 1.12.12

gnu cvs 1.12.6

gnu cvs 1.12.3

gnu cvs 1.12.11

gnu cvs 1.12.10

gnu cvs 1.12.9

gnu cvs 1.12.7

gnu cvs 1.12.13

gnu cvs 1.12.5

gnu cvs 1.12.1

canonical ubuntu linux 17.04

canonical ubuntu linux 14.04

canonical ubuntu linux 16.04

debian debian linux 9.0

debian debian linux 8.0

Vendor Advisories

cvs could be made run programs as your login if it opened a specially crafted cvs repository ...
Debian Bug report logs - #871810 cvs: CVE-2017-12836: CVS and ssh command injection Package: src:cvs; Maintainer for src:cvs is Thorsten Glaser <tg@mirbsdde>; Reported by: Salvatore Bonaccorso <carnil@debianorg> Date: Fri, 11 Aug 2017 19:42:02 UTC Severity: grave Tags: patch, security, upstream Found in version cv ...
Debian Bug report logs - #873088 git-annex: remote code execution via crafted SSH URLs (CVE-2017-12976) Package: git-annex; Maintainer for git-annex is Debian Haskell Group <pkg-haskell-maintainers@listsaliothdebianorg>; Source for git-annex is src:git-annex (PTS, buildd, popcon) Reported by: Antoine Beaupre <anarcat@o ...
CVS 112x, when configured to use SSH for remote repositories, might allow remote attackers to execute arbitrary code via a repository URL with a crafted hostname, as demonstrated by "-oProxyCommand=id;localhost:/bar" ...