Goal Reached Thanks to every supporter β€” we hit 100%!

Goal: 1000 CNY Β· Raised: 1000 CNY

100.0%

CVE-2017-1000117 β€” AI Deep Analysis Summary

Q1What is this vulnerability? (Essence + Consequences)

🚨 **Essence**: Git < 2.7.5 suffers from **Command Injection** via crafted `ssh://` URLs. πŸ’₯ **Consequences**: Attackers can execute **arbitrary commands** on the victim's device remotely.…

Q2Root Cause? (CWE/Flaw)

πŸ›‘οΈ **Root Cause**: Improper handling of SSH URLs in Git versions prior to 2.7.5. The system fails to sanitize inputs, allowing malicious SSH options (like `-oProxyCommand`) to be passed to the underlying shell.…

Q3Who is affected? (Versions/Components)

πŸ“¦ **Affected**: All **Git clients** with version **< 2.14.1** (specifically mentioned in PoCs, though description says < 2.7.5). It impacts the distributed version control system used by developers worldwide. 🌍

Q4What can hackers do? (Privileges/Data)

πŸ’€ **Attacker Capabilities**: Run **arbitrary programs** with the privileges of the user running Git. Examples from PoCs: `touch VULNERABLE`, writing `/etc/passwd` to `/tmp/pwned.txt`, or executing `id`.…

Q5Is exploitation threshold high? (Auth/Config)

⚑ **Exploitation Threshold**: **LOW**. No authentication required. The attack vector is simply cloning a malicious repository using `git clone --recurse-submodules` with a crafted SSH URL.…

Q6Is there a public Exp? (PoC/Wild Exploitation)

πŸ”₯ **Public Exploits**: **YES**. Multiple Proof of Concepts (PoCs) are available on GitHub (e.g., timwr, Manouchehri, thelastbyte). They demonstrate successful command execution easily.…

Q7How to self-check? (Features/Scanning)

πŸ” **Self-Check**: Run `git --version`. If version is **< 2.7.5** (or < 2.14.1 per PoCs), you are vulnerable.…

Q8Is it fixed officially? (Patch/Mitigation)

βœ… **Official Fix**: **YES**. The vulnerability was patched in **Git 2.7.5** and later versions (up to 2.14.1+). Vendors like Debian (DSA-3934), Red Hat (RHSA-2017:2491), and Gentoo (GLSA-201709-10) issued advisories. πŸ› οΈ

Q9What if no patch? (Workaround)

🚧 **No Patch Workaround**: **Avoid** cloning repositories from untrusted sources. Do not use `--recurse-submodules` with external repos. If possible, restrict Git usage or use strict URL filtering.…

Q10Is it urgent? (Priority Suggestion)

🚨 **Urgency**: **CRITICAL**. Since it allows remote code execution with low effort and public exploits exist, immediate patching is required. Priority: **P0**. Update Git immediately to prevent system compromise. ⏳