CVE-2014-9706 — Project Dulwich vulnerability
Severity
7.5HIGHNVD
EPSS
2.8%
top 13.96%
CISA KEV
Not in KEV
Exploit
No known exploits
Affected products
Timeline
PublishedMar 31
Latest updateMay 17
Description
The build_index_from_tree function in index.py in Dulwich before 0.9.9 allows remote attackers to execute arbitrary code via a commit with a directory path starting with .git/, which is not properly handled when checking out a working tree.
CVSS vector
AV:N/AC:L/C:P/I:P/A:PExploitability: 10.0 | Impact: 6.4
Affected Packages3 packages
Also affects: Debian Linux 7.0
🔴Vulnerability Details
4📋Vendor Advisories
1Debian▶
CVE-2014-9706: dulwich - The build_index_from_tree function in index.py in Dulwich before 0.9.9 allows re...↗2014
💬Community
3Bugzilla▶
CVE-2014-9706 python-dulwich: arbitrary files allowed to be commited, leading to code execution [fedora-all]↗2015-03-23
Bugzilla▶
CVE-2014-9706 python-dulwich: arbitrary files allowed to be commited, leading to code execution↗2015-03-23
Bugzilla▶
CVE-2014-9706 python-dulwich: arbitrary files allowed to be commited, leading to code execution [epel-all]↗2015-03-23