Gitlist before 0.5.0 allows remote attackers to execute arbitrary commands via shell metacharacters in the file name in the URI of a request for a (1) blame, (2) file, or (3) stats page, as demonstrated by requests to blame/master/, master/, and stats/master/.
References
Configurations
Configuration 1 (hide)
|
History
21 Nov 2024, 02:10
Type | Values Removed | Values Added |
---|---|---|
References | () http://hatriot.github.io/blog/2014/06/29/gitlist-rce/ - Exploit | |
References | () http://packetstormsecurity.com/files/127281/Gitlist-0.4.0-Remote-Code-Execution.html - Exploit | |
References | () http://packetstormsecurity.com/files/127364/Gitlist-Unauthenticated-Remote-Command-Execution.html - Exploit | |
References | () http://www.exploit-db.com/exploits/33929 - Exploit | |
References | () http://www.exploit-db.com/exploits/33990 - Exploit | |
References | () https://groups.google.com/forum/#%21topic/gitlist/Hw_KdZfA4js - |
Information
Published : 2014-07-22 14:55
Updated : 2025-04-12 10:46
NVD link : CVE-2014-4511
Mitre link : CVE-2014-4511
CVE.ORG link : CVE-2014-4511
JSON object : View
Products Affected
gitlist
- gitlist
CWE