Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2017-1000117 PoC — Git 命令注入漏洞

Source
Associated Vulnerability
Title:Git 命令注入漏洞 (CVE-2017-1000117)
Description:A malicious third-party can give a crafted "ssh://..." URL to an unsuspecting victim, and an attempt to visit the URL can result in any program that exists on the victim's machine being executed. Such a URL could be placed in the .gitmodules file of a malicious project, and an unsuspecting victim could be tricked into running "git clone --recurse-submodules" to trigger the vulnerability.
Readme
Test repository to check Git's vulnerability [CVE-2017-1000117](https://access.redhat.com/security/cve/cve-2017-1000117)

## How it works?

Clone this repository recursively.

```
$ git clone --recursive https://github.com/sasairc/CVE-2017-1000117_wasawasa.git
```

## Original

[greymd/CVE-2017-1000117](https://github.com/greymd/CVE-2017-1000117)

File Snapshot

[4.0K] /data/pocs/fb9fd64f4711a56d6fa08de138b1a5d992f58822 ├── [ 350] README.md └── [4.0K] wasawasa 1 directory, 1 file
Shenlong Bot has cached this for you
Remarks
    1. It is advised to access via the original source first.
    2. Local POC snapshots are reserved for subscribers — if the original source is unavailable, the local mirror is part of the paid plan.
    3. Mirroring, verifying, and maintaining this POC archive takes ongoing effort, so local snapshots are a paid feature. Your subscription keeps the archive online — thank you for the support. View subscription plans →