blob: d733e2c52b9314f552ed0bb996bad9afefe3d24b [file] [log] [blame]
module = "github.com/git-lfs/git-lfs"
package = "github.com/git-lfs/git-lfs/lfsapi"
description = """
Arbitary command execution can be triggered by improperly
sanitized SSH URLs in LFS configuration files. This can be
triggered by cloning a malicious repoistory.
"""
cve = "CVE-2017-17831"
symbols = ["sshGetLFSExeAndArgs"]
published = "2021-04-14T12:00:00Z"
[[versions]]
fixed = "v2.1.1-0.20170519163204-f913f5f9c7c6+incompatible"
[links]
commit = "https://github.com/git-lfs/git-lfs/commit/f913f5f9c7c6d1301785fdf9884a2942d59cdf19"
pr = "https://github.com/git-lfs/git-lfs/pull/2241"
context = [
"http://blog.recurity-labs.com/2017-08-10/scm-vulns",
"https://confluence.atlassian.com/sourcetreekb/sourcetree-security-advisory-2018-01-24-942834324.html",
"http://www.securityfocus.com/bid/102926"
]