CVE-2017-17831: Improper Input Validation
(updated )
GitHub Git LFS before 2.1.1 allows remote attackers to execute arbitrary commands via an ssh URL with an initial dash character in the hostname, located on a “url =” line in a .lfsconfig file within a repository.
References
- blog.recurity-labs.com/2017-08-10/scm-vulns
- www.securityfocus.com/bid/102926
- confluence.atlassian.com/sourcetreekb/sourcetree-security-advisory-2018-01-24-942834324.html
- github.com/advisories/GHSA-w4xh-w33p-4v29
- github.com/git-lfs/git-lfs/commit/f913f5f9c7c6d1301785fdf9884a2942d59cdf19
- github.com/git-lfs/git-lfs/pull/2241
- github.com/git-lfs/git-lfs/pull/2242
- github.com/git-lfs/git-lfs/releases/tag/v2.1.1
- nvd.nist.gov/vuln/detail/CVE-2017-17831
- pkg.go.dev/vuln/GO-2021-0073
- web.archive.org/web/20200227131639/http://www.securityfocus.com/bid/102926
Detect and mitigate CVE-2017-17831 with GitLab Dependency Scanning
Secure your software supply chain by verifying that all open source dependencies used in your projects contain no disclosed vulnerabilities. Learn more about Dependency Scanning →