CVE-2017-16228 — Improper Input Validation in Project Dulwich
Severity
9.8CRITICALNVD
EPSS
0.4%
top 37.76%
CISA KEV
Not in KEV
Exploit
No known exploits
Affected products
Timeline
PublishedOct 29
Latest updateMay 13
Description
Dulwich before 0.18.5, when an SSH subprocess is used, allows remote attackers to execute arbitrary commands via an ssh URL with an initial dash character in the hostname, a related issue to CVE-2017-9800, CVE-2017-12836, CVE-2017-12976, CVE-2017-1000116, and CVE-2017-1000117.
CVSS vector
CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:HExploitability: 3.9 | Impact: 5.9
Affected Packages3 packages
Patches
🔴Vulnerability Details
4📋Vendor Advisories
3💬Community
3Bugzilla▶
CVE-2017-16228 python-dulwich: Setting SSH arguments from untrusted URLs allows code execution [fedora-all]↗2017-11-03
Bugzilla▶
CVE-2017-16228 python-dulwich: Setting SSH arguments from untrusted URLs allows code execution [epel-all]↗2017-11-03
Bugzilla▶
CVE-2017-16228 python-dulwich: Setting SSH arguments from untrusted URLs allows code execution↗2017-11-03