Vulnerabilities > CVE-2014-5023 - Remote Command Execution vulnerability in GitList

047910
CVSS 6.8 - MEDIUM
Attack vector
NETWORK
Attack complexity
MEDIUM
Privileges required
NONE
Confidentiality impact
PARTIAL
Integrity impact
PARTIAL
Availability impact
PARTIAL
network
gitlist
exploit available

Summary

Repository.php in Gitter, as used in Gitlist, allows remote attackers with commit privileges to execute arbitrary commands via shell metacharacters in a branch name, as demonstrated by a "git checkout -b" command. <a href="http://cwe.mitre.org/data/definitions/77.html" target="_blank">CWE-77: Improper Neutralization of Special Elements used in a Command ('Command Injection'</a>

Vulnerable Configurations

Part Description Count
Application
Gitlist
1

Exploit-Db

descriptionGitlist <= 0.4.0 - Remote Code Execution. CVE-2013-7392,CVE-2014-4511,CVE-2014-5023. Remote exploits for multiple platform
fileexploits/multiple/remote/33929.py
idEDB-ID:33929
last seen2016-02-03
modified2014-06-30
platformmultiple
port
published2014-06-30
reporterdrone
sourcehttps://www.exploit-db.com/download/33929/
titleGitlist <= 0.4.0 - Remote Code Execution
typeremote