[Bug 1071709] New: VUL-0: fossil: client-side code execution via specially crafted ssh:// URL (ProxyCommand)
http://bugzilla.opensuse.org/show_bug.cgi?id=1071709 Bug ID: 1071709 Summary: VUL-0: fossil: client-side code execution via specially crafted ssh:// URL (ProxyCommand) Classification: openSUSE Product: openSUSE Distribution Version: Leap 42.3 Hardware: Other OS: Other Status: NEW Severity: Normal Priority: P5 - None Component: Security Assignee: max@suse.com Reporter: astieger@suse.com QA Contact: security-team@suse.de Found By: Security Response Team Blocker: ---
From https://www.fossil-scm.org/xfer/doc/trunk/www/changes.wiki
Fix the "ssh://" protocol to prevent an attack whereby the attacker convinces a victim to run a "clone" with a dodgy URL and thereby gains access to their system.
Fix the SSH sync protocol to avoid "ssh" command-line option injection attacks such as those fixed in Git 2.14.1, Mercurial 4.2.3, and Subversion 1.9.7. As "ssh://" URLs cannot be buried out of sight in Fossil, the vulnerability does not appear to be as severe as in those other systems
Fixed in 2.4 git: bug 1052481 CVE-2017-1000117 svn: bug 1051362 CVE-2017-9800 -- You are receiving this mail because: You are on the CC list for the bug.
http://bugzilla.opensuse.org/show_bug.cgi?id=1071709
Reinhard Max
http://bugzilla.opensuse.org/show_bug.cgi?id=1071709
http://bugzilla.opensuse.org/show_bug.cgi?id=1071709#c3
--- Comment #3 from Andreas Stieger
http://bugzilla.opensuse.org/show_bug.cgi?id=1071709
http://bugzilla.opensuse.org/show_bug.cgi?id=1071709#c4
Andreas Stieger
participants (1)
-
bugzilla_noreply@novell.com