Vulnerability Details : CVE-2008-5517
The web interface in git (gitweb) 1.5.x before 1.5.6 allows remote attackers to execute arbitrary commands via shell metacharacters related to (1) git_snapshot and (2) git_object.
Products affected by CVE-2008-5517
- cpe:2.3:a:git:git:1.5.4:rc1.1136.g2794:*:*:*:*:*:*
- cpe:2.3:a:git:git:1.5.4:rc0:*:*:*:*:*:*
- cpe:2.3:a:git:git:1.5.4:*:*:*:*:*:*:*
- cpe:2.3:a:git:git:1.5.4.7:*:*:*:*:*:*:*
- cpe:2.3:a:git:git:1.5.4.6:*:*:*:*:*:*:*
- cpe:2.3:a:git:git:1.5.3:rc7:*:*:*:*:*:*
- cpe:2.3:a:git:git:1.5.3:rc5:*:*:*:*:*:*
- cpe:2.3:a:git:git:1.5.3.3:*:*:*:*:*:*:*
- cpe:2.3:a:git:git:1.5.3.2:*:*:*:*:*:*:*
- cpe:2.3:a:git:git:1.5.3.1:*:*:*:*:*:*:*
- cpe:2.3:a:git:git:1.5.1:*:*:*:*:*:*:*
- cpe:2.3:a:git:git:1.5.1.6:*:*:*:*:*:*:*
- cpe:2.3:a:git:git:1.5.0:rc4:*:*:*:*:*:*
- cpe:2.3:a:git:git:1.5.0:rc3:*:*:*:*:*:*
- cpe:2.3:a:git:git:1.5.0.1:*:*:*:*:*:*:*
- cpe:2.3:a:git:git:1.5.4:rc5:*:*:*:*:*:*
- cpe:2.3:a:git:git:1.5.4:rc4:*:*:*:*:*:*
- cpe:2.3:a:git:git:1.5.4:rc3:*:*:*:*:*:*
- cpe:2.3:a:git:git:1.5.4.5:*:*:*:*:*:*:*
- cpe:2.3:a:git:git:1.5.4.4:*:*:*:*:*:*:*
- cpe:2.3:a:git:git:1.5.3:rc4:*:*:*:*:*:*
- cpe:2.3:a:git:git:1.5.3.8:*:*:*:*:*:*:*
- cpe:2.3:a:git:git:1.5.2:*:*:*:*:*:*:*
- cpe:2.3:a:git:git:1.5.2.5:*:*:*:*:*:*:*
- cpe:2.3:a:git:git:1.5.1.5:*:*:*:*:*:*:*
- cpe:2.3:a:git:git:1.5.1.4:*:*:*:*:*:*:*
- cpe:2.3:a:git:git:1.5.0:rc2:*:*:*:*:*:*
- cpe:2.3:a:git:git:1.5.0.7:*:*:*:*:*:*:*
- cpe:2.3:a:git:git:1.5.4.1:*:*:*:*:*:*:*
- cpe:2.3:a:git:git:1.5.3:*:*:*:*:*:*:*
- cpe:2.3:a:git:git:1.5.3.5:*:*:*:*:*:*:*
- cpe:2.3:a:git:git:1.5.3.4:*:*:*:*:*:*:*
- cpe:2.3:a:git:git:1.5.2.2:*:*:*:*:*:*:*
- cpe:2.3:a:git:git:1.5.2.1:*:*:*:*:*:*:*
- cpe:2.3:a:git:git:1.5.1.1:*:*:*:*:*:*:*
- cpe:2.3:a:git:git:1.5.0:*:*:*:*:*:*:*
- cpe:2.3:a:git:git:1.5.0.4:*:*:*:*:*:*:*
- cpe:2.3:a:git:git:1.5.0.3:*:*:*:*:*:*:*
- cpe:2.3:a:git:git:1.5.0.2:*:*:*:*:*:*:*
- cpe:2.3:a:git:git:1.5.4:rc2:*:*:*:*:*:*
- cpe:2.3:a:git:git:1.5.4:rc1:*:*:*:*:*:*
- cpe:2.3:a:git:git:1.5.4.3:*:*:*:*:*:*:*
- cpe:2.3:a:git:git:1.5.4.2:*:*:*:*:*:*:*
- cpe:2.3:a:git:git:1.5.3.7:*:*:*:*:*:*:*
- cpe:2.3:a:git:git:1.5.3.6:*:*:*:*:*:*:*
- cpe:2.3:a:git:git:1.5.2.4:*:*:*:*:*:*:*
- cpe:2.3:a:git:git:1.5.2.3:*:*:*:*:*:*:*
- cpe:2.3:a:git:git:1.5.1.3:*:*:*:*:*:*:*
- cpe:2.3:a:git:git:1.5.1.2:*:*:*:*:*:*:*
- cpe:2.3:a:git:git:1.5.0.6:*:*:*:*:*:*:*
- cpe:2.3:a:git:git:1.5.0.5:*:*:*:*:*:*:*
Exploit prediction scoring system (EPSS) score for CVE-2008-5517
13.73%
Probability of exploitation activity in the next 30 days
EPSS Score History
~ 96 %
Percentile, the proportion of vulnerabilities that are scored at or less
CVSS scores for CVE-2008-5517
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source | First Seen |
---|---|---|---|---|---|---|
7.5
|
HIGH | AV:N/AC:L/Au:N/C:P/I:P/A:P |
10.0
|
6.4
|
NIST |
CWE ids for CVE-2008-5517
-
The product constructs all or part of a code segment using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the syntax or behavior of the intended code segment.Assigned by: nvd@nist.gov (Primary)
References for CVE-2008-5517
-
http://repo.or.cz/w/git.git?a=commitdiff%3Bh=516381d5
-
http://www.openwall.com/lists/oss-security/2009/01/23/2
-
http://www.securityfocus.com/bid/33215
Patch
-
http://www.openwall.com/lists/oss-security/2009/01/21/7
-
http://www.gentoo.org/security/en/glsa/glsa-200903-15.xml
-
https://issues.rpath.com/browse/RPL-2936
-
http://www.ubuntu.com/usn/USN-723-1
-
http://lists.opensuse.org/opensuse-security-announce/2009-01/msg00002.html
-
http://www.debian.org/security/2009/dsa-1708
-
http://www.vupen.com/english/advisories/2009/0175
Vendor Advisory
-
https://bugzilla.redhat.com/show_bug.cgi?id=479715
-
http://www.openwall.com/lists/oss-security/2009/01/20/1
-
http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=512330
-
http://www.securityfocus.com/archive/1/500008/100/0/threaded
-
http://wiki.rpath.com/Advisories:rPSA-2009-0005
Jump to