关联漏洞
标题:
Git 命令注入漏洞
(CVE-2017-1000117)
描述:Git是美国软件开发者林纳斯-托瓦兹(Linus Torvalds)所研发的一套免费、开源的分布式版本控制系统。 Git 2.7.5之前的版本中存在命令漏洞。远程攻击者可借助特制的‘ssh://...’URL利用该漏洞运行任意设备已退出的程序。
描述
Check Git's vulnerability CVE-2017-1000117
介绍
Test repository to check Git's vulnerability [CVE-2017-1000117](https://access.redhat.com/security/cve/cve-2017-1000117)
## How it works?
Clone this repository recursively.
The sentence 「うんこもりもり」(which means like "Lots of shit.") will be shown on your terminal.
```
$ git clone --recursive https://github.com/greymd/CVE-2017-1000117.git
Cloning into 'CVE-2017-1000117'...
remote: Counting objects: 5, done.
remote: Compressing objects: 100% (4/4), done.
remote: Total 5 (delta 0), reused 5 (delta 0), pack-reused 0
...
"mm
mmmm "m "mmmmm
"" # m" "
# m#m m
# m" # m "m m
m" m" "mm" """""
m m m m m m
mm# # # "m mm# # # "m
m"#" ## # m"#" ## #
""#mm "m # # ""#mm "m # #
# # # # # #
"mm" m" "mm" m"
...
```
## Tested on:
* Linux (Ubuntu 16.04)
* macOS Sierra
* Windows 64bit -- Cygwin
* Windows 64bit -- Git Bash (MinGW-w64)
文件快照
[4.0K] /data/pocs/ca766ac5e7cf7274077c69ab0361edc57c5c49cc
├── [ 230] file
├── [4.0K] morimori
└── [1.1K] README.md
1 directory, 2 files
备注
1. 建议优先通过来源进行访问。
2. 如果因为来源失效或无法访问,请发送邮箱到 f.jinxu#gmail.com 索取本地快照(把 # 换成 @)。
3. 神龙已为您对POC代码进行快照,为了长期维护,请考虑为本地POC付费,感谢您的支持。