CVE-2018-1000021

SOURCE - nist

Summary

GIT version 2.15.1 and earlier contains a Input Validation Error vulnerability in Client that can result in problems including messing up terminal configuration to RCE. This attack appear to be exploitable via The user must interact with a malicious git server, (or have their traffic modified in a MITM attack).

EPSS Score: 0.00159 (0.522)

Common Weakness Enumeration (CWE)

SOURCE - nist

Improper Input Validation

SOURCE - redhat

Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')


debian

CREATED


UPDATED



EXPLOITABILITY SCORE

-


EXPLOITS FOUND
-

COMMON WEAKNESS ENUMERATION (CWE)-

CVSS SCORE

N/Alow
PackageTypeOS NameOS VersionAffected RangesFix Versions
debian/gitdebdebian12>=1:2.39.2-1.1Not yet available
debian/gitdebdebian11>=1:2.30.2-1+deb11u2Not yet available
debian/gitdebdebianunstable>=1:2.43.0-1Not yet available
debian/gitdebdebian10>=1:2.20.1-2+deb10u3Not yet available
debian/gitdebdebian13>=1:2.43.0-1Not yet available

Severity and metrics

No CVSS data available from this source.

nist

CREATED


UPDATED



EXPLOITABILITY SCORE

2.8


EXPLOITS FOUND
-

COMMON WEAKNESS ENUMERATION (CWE)

CVSS SCORE

8.8high

ubuntu

CREATED


UPDATED



EXPLOITABILITY SCORE

2.8


EXPLOITS FOUND
-

COMMON WEAKNESS ENUMERATION (CWE)-

CVSS SCORE

8.8low

redhat

CREATED


UPDATED



EXPLOITABILITY SCORE

1.6


EXPLOITS FOUND
-

COMMON WEAKNESS ENUMERATION (CWE)

CVSS SCORE

5medium