Vulnerability Description
In Git before 2.13.7, 2.14.x before 2.14.4, 2.15.x before 2.15.2, 2.16.x before 2.16.4, and 2.17.x before 2.17.1, remote code execution can occur. With a crafted .gitmodules file, a malicious project can execute an arbitrary script on a machine that runs "git clone --recurse-submodules" because submodule "names" are obtained from this file, and then appended to $GIT_DIR/modules, leading to directory traversal with "../" in a name. Finally, post-checkout hooks from a submodule are executed, bypassing the intended design in which hooks are not obtained from a remote server.
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Debian | Debian Linux | 8.0 |
| Canonical | Ubuntu Linux | 14.04 |
| Redhat | Enterprise Linux | 7.0 |
| Redhat | Enterprise Linux Desktop | 7.0 |
| Redhat | Enterprise Linux Server | 7.0 |
| Redhat | Enterprise Linux Server Eus | 7.5 |
| Redhat | Enterprise Linux Workstation | 7.0 |
| Git-Scm | Git | <= 2.13.6 |
| Gitforwindows | Git | <= 2.17.1 |
Related Weaknesses (CWE)
References
- http://lists.opensuse.org/opensuse-security-announce/2020-05/msg00003.html
- http://www.securityfocus.com/bid/104345Third Party AdvisoryVDB Entry
- http://www.securitytracker.com/id/1040991Third Party AdvisoryVDB Entry
- https://access.redhat.com/errata/RHSA-2018:1957Third Party Advisory
- https://access.redhat.com/errata/RHSA-2018:2147Third Party Advisory
- https://blogs.msdn.microsoft.com/devops/2018/05/29/announcing-the-may-2018-git-sPatchTechnical DescriptionVendor Advisory
- https://marc.info/?l=git&m=152761328506724&w=2Release NotesThird Party Advisory
- https://security.gentoo.org/glsa/201805-13Third Party Advisory
- https://usn.ubuntu.com/3671-1/Third Party Advisory
- https://www.debian.org/security/2018/dsa-4212Third Party Advisory
- https://www.exploit-db.com/exploits/44822/ExploitThird Party AdvisoryVDB Entry
- http://lists.opensuse.org/opensuse-security-announce/2020-05/msg00003.html
- http://www.securityfocus.com/bid/104345Third Party AdvisoryVDB Entry
- http://www.securitytracker.com/id/1040991Third Party AdvisoryVDB Entry
- https://access.redhat.com/errata/RHSA-2018:1957Third Party Advisory
FAQ
What is CVE-2018-11235?
CVE-2018-11235 is a vulnerability with a CVSS score of 7.8 (HIGH). In Git before 2.13.7, 2.14.x before 2.14.4, 2.15.x before 2.15.2, 2.16.x before 2.16.4, and 2.17.x before 2.17.1, remote code execution can occur. With a crafted .gitmodules file, a malicious project ...
How severe is CVE-2018-11235?
CVE-2018-11235 has been rated HIGH with a CVSS base score of 7.8/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2018-11235?
Check the references section above for vendor advisories and patch information. Affected products include: Debian Debian Linux, Canonical Ubuntu Linux, Redhat Enterprise Linux, Redhat Enterprise Linux Desktop, Redhat Enterprise Linux Server.