In Git before 2.13.7, 2.14.x before 2.14.4, 2.15.x before 2.15.2, 2.16.x before 2.16.4, and 2.17.x before 2.17.1, remote code execution can occur. With a crafted .gitmodules file, a malicious project can execute an arbitrary script on a machine that runs "git clone --recurse-submodules" because submodule "names" are obtained from this file, and then appended to $GIT_DIR/modules, leading to directory traversal with "../" in a name. Finally, post-checkout hooks from a submodule are executed, bypassing the intended design in which hooks are not obtained from a remote server.
Weakness: Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')
The software uses external input to construct a pathname that is intended to identify a file or directory that is located underneath a restricted parent directory, but the software does not properly neutralize special elements within the pathname that can cause the pathname to resolve to a location that is outside of the restricted directory.
This section is open source, for any additional information that enhances or clarifies the official advisory above.
CVE-2018-11235 Exploits (22)
- Rogdham/CVE-2018-11235 ( 44)
- CHYbeta/CVE-2018-11235-DEMO ( 13)
- qweraqq/CVE-2018-11235-Git-Submodule-CE ( 2)
- H0K5/clone_and_pwn ( 1)
- AnonymKing/CVE-2018-11235 ( 1)
- ygouzerh/CVE-2018-11235 ( 1)
Show all exploits (+12):
Official CVE References
View references (11)