|
Message-ID: <20160929154004.kphifrcks2b7boh6@jwilk.net> Date: Thu, 29 Sep 2016 17:40:04 +0200 From: Jakub Wilk <jwilk@...lk.net> To: oss-security@...ts.openwall.com Subject: git-hub: missing sanitization of data received from GitHub git-hub <https://github.com/sociomantic-tsunami/git-hub> is a Git command-line interface to GitHub. When you ask it to clone a repository, it will call: git clone <repourl> <reponame> where both <repourl> and <reponame> come from GitHub API, without any sanitization. Operators of the GitHub server (or a MitM attacker[*]) could exploit it for directory traversal or, more excitingly, for arbitrary code execution, either via option injection, e.g.: git clone 'git://-esystem("cowsay pwned > \x2fdev\x2ftty")/' --config=core.gitProxy=perl or more directly with git-remote-ext, e.g.: git clone 'ext::sh -c cowsay% pwned% >% /dev/tty' moo Upstream bug report: https://github.com/sociomantic-tsunami/git-hub/issues/197 [*] git-hub is implemented in Python, which didn't verify HTTPS certificates before 2.7.9; and git-hub doesn't enable verification on its own either. -- Jakub Wilk
Powered by blists - more mailing lists
Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.
Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.