•  
      request #10591 Arbitrary code execution via well crafted URL in CVS
    Infos
    #10591
    Thomas Gerbet (tgerbet)
    2017-08-23 15:43
    2017-08-23 15:11
    10835
    Details
    Arbitrary code execution via well crafted URL in CVS

    Arbitrary code execution can be achieved when a repository is retrieved from a well crafted URL.

    Impact

    Impact are similar than for request #10543. Tuleap has a dependency on hiw own CVS version (package cvs-tuleap in the repositories)

    References

    Blogpost from the security researcher that has found the issue: Compromise On Checkout - Vulnerabilities in SCM Tools
    CVE-2017-12836 has been assigned to this issue for CVS
    Confirmation of the issue for CVS on oss-sec ML

    SCM/CVS
    All
    Empty
    • [ ] enhancement
    • [ ] internal improvement
    Empty
    Stage
    Empty
    Declined
    2017-08-23
    Attachments
    Empty
    References
    Referenced by request #10591

    Artifact Tracker v5

    rel #10571 9.12

    Follow-ups

    User avatar
    Thomas Gerbet (tgerbet)2017-08-23 15:43
    RedHat position on this is won't fix [1]. The patch done by the more or less current maintainer [2] does not apply cleanly since the code he maintains has a bit diverged from what we have.

    Exploiting the vulnerability is hard with CVS especially in our context. Like the CVS RedHat distributes, the one in the Tuleap repository won't be fixed.

    [1] https://access.redhat.com/security/cve/cve-2017-12836
    [2] https://www.mirbsd.org/permalinks/wlog-10_e20170811-tg.htm

    • Status changed from Under implementation to Declined
    • Connected artifacts
    • Close date set to 2017-08-23