HTTP: Git Submodules Directory Traversal Code Execution

This signature detects directory traversal attempts on Git Client. Successful attack attempts could allow attacker to execute arbitrary scripts on the targeted system.

Extended Description

In Git before 2.13.7, 2.14.x before 2.14.4, 2.15.x before 2.15.2, 2.16.x before 2.16.4, and 2.17.x before 2.17.1, remote code execution can occur. With a crafted .gitmodules file, a malicious project can execute an arbitrary script on a machine that runs "git clone --recurse-submodules" because submodule "names" are obtained from this file, and then appended to $GIT_DIR/modules, leading to directory traversal with "../" in a name. Finally, post-checkout hooks from a submodule are executed, bypassing the intended design in which hooks are not obtained from a remote server.

Affected Products

Git-scm git

Short Name
HTTP:STC:GIT-CLIENT-DIR-TRA
Severity
Minor
Recommended
True
Recommended Action
Drop
Category
HTTP
Keywords
CVE-2018-11235 Code Directory Execution Git Submodules Traversal bid:104345
Release Date
07/03/2018
Supported Platforms

srx-branch-12.3

srx-19.3

srx-branch-19.3

vsrx3bsd-19.2

srx-branch-19.4

vsrx-19.4

mx-12.3

mx-19.4

vmx-19.4

mx-19.3

vsrx3bsd-19.4

srx-19.4

vsrx-12.3

vmx-19.3

vsrx-19.2

srx-12.3

Sigpack Version
3590
False Positive
Unknown
Vendors

Gitforwindows

Git-scm

Debian

Redhat

Canonical

CVSS Score

6.8

Found a potential security threat?