Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2017-1000117 PoC — Git 命令注入漏洞

Source
Associated Vulnerability
Title:Git 命令注入漏洞 (CVE-2017-1000117)
Description:A malicious third-party can give a crafted "ssh://..." URL to an unsuspecting victim, and an attempt to visit the URL can result in any program that exists on the victim's machine being executed. Such a URL could be placed in the .gitmodules file of a malicious project, and an unsuspecting victim could be tricked into running "git clone --recurse-submodules" to trigger the vulnerability.
Readme
Test repository to check Git's vulnerability [CVE-2017-1000117](https://access.redhat.com/security/cve/cve-2017-1000117), and try to upgrade git version.


```
$ git clone --recursive https://github.com/shogo82148/Fix-CVE-2017-1000117.git
```

The repository is inspired by https://github.com/greymd/CVE-2017-1000117 .
To make sure that your git is safe, please clone it with `--recursive` option.
File Snapshot

[4.0K] /data/pocs/3a4255d3daedd523f556bc6f5bb91c140d7dc09e ├── [ 268] Makefile ├── [ 398] README.md ├── [4.0K] subs │   └── [4.0K] foobar └── [ 191] upgrade.sh 2 directories, 3 files
Shenlong Bot has cached this for you
Remarks
    1. It is advised to access via the original source first.
    2. Local POC snapshots are reserved for subscribers — if the original source is unavailable, the local mirror is part of the paid plan.
    3. Mirroring, verifying, and maintaining this POC archive takes ongoing effort, so local snapshots are a paid feature. Your subscription keeps the archive online — thank you for the support. View subscription plans →