CVE-2018-11235

In Git before 2.13.7, 2.14.x before 2.14.4, 2.15.x before 2.15.2, 2.16.x before 2.16.4, and 2.17.x before 2.17.1, remote code execution can occur. With a crafted .gitmodules file, a malicious project can execute an arbitrary script on a machine that runs "git clone --recurse-submodules" because submodule "names" are obtained from this file, and then appended to $GIT_DIR/modules, leading to directory traversal with "../" in a name. Finally, post-checkout hooks from a submodule are executed, bypassing the intended design in which hooks are not obtained from a remote server.
Path Traversal
ProviderTypeBase ScoreAtk. VectorAtk. ComplexityPriv. RequiredVector
NISTNIST
7.8 HIGH
LOCAL
LOW
NONE
CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
mitreCNA
---
---
CVEADP
---
---
Base Score
CVSS 3.x
EPSS Score
Percentile: 97%
VendorProductVersion
debiandebian_linux
8.0
debiandebian_linux
9.0
canonicalubuntu_linux
14.04
canonicalubuntu_linux
16.04
canonicalubuntu_linux
17.10
canonicalubuntu_linux
18.04
redhatenterprise_linux
7.0
redhatenterprise_linux_desktop
7.0
redhatenterprise_linux_server
7.0
redhatenterprise_linux_server_eus
7.5
redhatenterprise_linux_workstation
7.0
git-scmgit
𝑥
≤ 2.13.6
git-scmgit
2.14.0 ≤
𝑥
≤ 2.14.3
git-scmgit
2.15.0 ≤
𝑥
≤ 2.15.1
git-scmgit
2.16.0 ≤
𝑥
≤ 2.16.3
git-scmgit
2.17.0
gitforwindowsgit
𝑥
≤ 2.17.1
𝑥
= Vulnerable software versions
Debian logo
Debian Releases
Debian Product
Codename
git
bullseye
1:2.30.2-1+deb11u2
fixed
bullseye (security)
1:2.30.2-1+deb11u3
fixed
bookworm
1:2.39.2-1.1
fixed
bookworm (security)
1:2.39.5-0+deb12u1
fixed
trixie
1:2.45.2-1
fixed
sid
1:2.45.2-1.1
fixed
Ubuntu logo
Ubuntu Releases
Ubuntu Product
Codename
git
bionic
Fixed 1:2.17.1-1ubuntu0.1
released
artful
Fixed 1:2.14.1-1ubuntu4.1
released
xenial
Fixed 1:2.7.4-0ubuntu1.4
released
trusty
Fixed 1:1.9.1-1ubuntu0.8
released