POC详情: ca766ac5e7cf7274077c69ab0361edc57c5c49cc

来源
关联漏洞
标题: Git 命令注入漏洞 (CVE-2017-1000117)
描述:Git是美国软件开发者林纳斯-托瓦兹(Linus Torvalds)所研发的一套免费、开源的分布式版本控制系统。 Git 2.7.5之前的版本中存在命令漏洞。远程攻击者可借助特制的‘ssh://...’URL利用该漏洞运行任意设备已退出的程序。
描述
Check Git's vulnerability CVE-2017-1000117
介绍
Test repository to check Git's vulnerability [CVE-2017-1000117](https://access.redhat.com/security/cve/cve-2017-1000117)

## How it works?

Clone this repository recursively.
The sentence 「うんこもりもり」(which means like "Lots of shit.") will be shown on your terminal.

```
$ git clone --recursive https://github.com/greymd/CVE-2017-1000117.git
Cloning into 'CVE-2017-1000117'...
remote: Counting objects: 5, done.
remote: Compressing objects: 100% (4/4), done.
remote: Total 5 (delta 0), reused 5 (delta 0), pack-reused 0

...

    "mm
    mmmm          "m           "mmmmm
  ""    #         m"               "
        #        m#m          m
       #        m"  #   m     "m     m
     m"        m"   "mm"        """""
   m            m   m          m            m   m
  mm#            # # "m       mm#            # # "m
   m"#"          ##   #        m"#"          ##   #
 ""#mm "m        #    #      ""#mm "m        #    #
   #    #            #         #    #            #
    "mm"           m"           "mm"           m"

...

```

## Tested on:

* Linux (Ubuntu 16.04)
* macOS Sierra
* Windows 64bit -- Cygwin
* Windows 64bit -- Git Bash (MinGW-w64)
文件快照

[4.0K] /data/pocs/ca766ac5e7cf7274077c69ab0361edc57c5c49cc ├── [ 230] file ├── [4.0K] morimori └── [1.1K] README.md 1 directory, 2 files
神龙机器人已为您缓存
备注
    1. 建议优先通过来源进行访问。
    2. 如果因为来源失效或无法访问,请发送邮箱到 f.jinxu#gmail.com 索取本地快照(把 # 换成 @)。
    3. 神龙已为您对POC代码进行快照,为了长期维护,请考虑为本地POC付费,感谢您的支持。