Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2017-1000117 PoC — Git 命令注入漏洞

Source
Associated Vulnerability
Title:Git 命令注入漏洞 (CVE-2017-1000117)
Description:A malicious third-party can give a crafted "ssh://..." URL to an unsuspecting victim, and an attempt to visit the URL can result in any program that exists on the victim's machine being executed. Such a URL could be placed in the .gitmodules file of a malicious project, and an unsuspecting victim could be tricked into running "git clone --recurse-submodules" to trigger the vulnerability.
Description
GitのCommand Injectionの脆弱性を利用してスクリプトを落として実行する例
Readme
# CVE-2017-1000117 でサーバーを立ち上げるやつ

次のコマンドを叩いてから、Webブラウザーを立ち上げて http://localhost:8088 にアクセスしてみよう!
```
$ git clone --recursive https://github.com/0gawa/CVE-2017-1000117
```

Hello World
と表示されたなら、gitをアップデートしよう!脆弱だ。
File Snapshot

[4.0K] /data/pocs/af4cfe98842cdcf39312f3a155880339902efbd9 ├── [4.0K] dummy1 ├── [4.0K] dummy2 ├── [4.0K] dummy3 └── [ 355] README.md 3 directories, 1 file
Shenlong Bot has cached this for you
Remarks
    1. It is advised to access via the original source first.
    2. Local POC snapshots are reserved for subscribers — if the original source is unavailable, the local mirror is part of the paid plan.
    3. Mirroring, verifying, and maintaining this POC archive takes ongoing effort, so local snapshots are a paid feature. Your subscription keeps the archive online — thank you for the support. View subscription plans →