Goal Reached Thanks to every supporter β€” we hit 100%!

Goal: 1000 CNY Β· Raised: 1000 CNY

100.0%

CVE-2018-14912 β€” AI Deep Analysis Summary

Q1What is this vulnerability? (Essence + Consequences)

🚨 **Essence**: CVE-2018-14912 is a **Directory Traversal** flaw in cgit. <br>πŸ’₯ **Consequences**: Attackers can read **arbitrary files** from the server.…

Q2Root Cause? (CWE/Flaw)

πŸ” **Root Cause**: The `cgit_clone_objects` function fails to sanitize input. <br>πŸ›‘ **Flaw**: It allows `../` sequences to escape the intended git objects directory.…

Q3Who is affected? (Versions/Components)

πŸ“¦ **Affected**: cgit versions **prior to 1.2.1**. <br>βš™οΈ **Component**: The C-based Git web frontend. <br>🌐 **Scope**: Any instance running older versions with HTTP clone enabled.

Q4What can hackers do? (Privileges/Data)

πŸ•΅οΈ **Hackers Can**: Retrieve **any file** the web server process can read. <br>πŸ“‚ **Data Impact**: Access to `/etc/passwd`, SSH keys, or internal git repositories.…

Q5Is exploitation threshold high? (Auth/Config)

⚑ **Threshold**: **LOW**. <br>πŸ”‘ **Auth**: No authentication required. <br>βš™οΈ **Config**: Only requires `enable-http-clone=1` (default in many setups). <br>🌍 **Access**: Publicly accessible via URL manipulation.

Q6Is there a public Exp? (PoC/Wild Exploitation)

πŸ“’ **Public Exp?**: **YES**. <br>πŸ”— **PoC**: Available on Exploit-DB (ID 45195) and Project Zero. <br>πŸ› οΈ **Tool**: Nuclei templates exist for automated scanning. <br>πŸ”₯ **Status**: Actively exploitable in the wild.

Q7How to self-check? (Features/Scanning)

πŸ”Ž **Self-Check**: Scan for `cgit/cgit.cgi/git/objects/?path=../`. <br>πŸ“‘ **Indicator**: Look for HTTP clone functionality enabled. <br>πŸ§ͺ **Test**: Send a request with `../` in the path parameter.…

Q8Is it fixed officially? (Patch/Mitigation)

βœ… **Fixed**: **YES**. <br>πŸ“¦ **Patch**: Upgrade to cgit **v1.2.1** or later. <br>πŸ“œ **Advisory**: Debian DSA-4263 and upstream fixes are available. <br>πŸ”„ **Action**: Immediate update recommended.

Q9What if no patch? (Workaround)

πŸ›‘οΈ **No Patch?**: Disable `enable-http-clone` in config. <br>🚫 **Mitigation**: Set `enable-http-clone=0`. <br>🧱 **WAF**: Block requests containing `../` in the `path` parameter for git objects.…

Q10Is it urgent? (Priority Suggestion)

🚨 **Urgency**: **HIGH**. <br>⏱️ **Priority**: Fix immediately. <br>πŸ“‰ **Risk**: Easy exploitation + High impact (Data Leak). <br>πŸ“’ **Note**: Public exploits exist. Do not wait for scheduled maintenance.