Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2017-1000117 PoC — Git 命令注入漏洞

Source
Associated Vulnerability
Title:Git 命令注入漏洞 (CVE-2017-1000117)
Description:A malicious third-party can give a crafted "ssh://..." URL to an unsuspecting victim, and an attempt to visit the URL can result in any program that exists on the victim's machine being executed. Such a URL could be placed in the .gitmodules file of a malicious project, and an unsuspecting victim could be tricked into running "git clone --recurse-submodules" to trigger the vulnerability.
Readme
# CVE-2017-1000117 PoC Repository for [VulApps](https://github.com/Medicean/VulApps/tree/master/s/ssh/1)

Fork from [joernchen/CVE-2017-1000117](https://gitlab.com/joernchen/CVE-2017-1000117)

`git clone --recursive https://github.com/VulApps/CVE-2017-1000117.git` will
write the output of `id` to a file `vul` in /var/www/html.

See More at [VulApps](https://github.com/Medicean/VulApps/tree/master/s/ssh/1)

File Snapshot

[4.0K] /data/pocs/16d48a3d7f7c755382e579d369967e7d74b9b08f ├── [4.0K] git ├── [ 34] payload └── [ 410] README.md 1 directory, 2 files
Shenlong Bot has cached this for you
Remarks
    1. It is advised to access via the original source first.
    2. Local POC snapshots are reserved for subscribers — if the original source is unavailable, the local mirror is part of the paid plan.
    3. Mirroring, verifying, and maintaining this POC archive takes ongoing effort, so local snapshots are a paid feature. Your subscription keeps the archive online — thank you for the support. View subscription plans →