Vulnerability Description
Repository.php in Gitter, as used in Gitlist, allows remote attackers with commit privileges to execute arbitrary commands via shell metacharacters in a branch name, as demonstrated by a "git checkout -b" command.
CVSS Score
MEDIUM
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Gitlist | Gitlist | - |
References
- http://hatriot.github.io/blog/2014/06/29/gitlist-rce/Exploit
- http://hatriot.github.io/blog/2014/06/29/gitlist-rce/Exploit
FAQ
What is CVE-2014-5023?
CVE-2014-5023 is a vulnerability with a CVSS score of 6.8 (MEDIUM). Repository.php in Gitter, as used in Gitlist, allows remote attackers with commit privileges to execute arbitrary commands via shell metacharacters in a branch name, as demonstrated by a "git checkout...
How severe is CVE-2014-5023?
CVE-2014-5023 has been rated MEDIUM with a CVSS base score of 6.8/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2014-5023?
Check the references section above for vendor advisories and patch information. Affected products include: Gitlist Gitlist.