CVE-2018-19486 — Untrusted Search Path in Ubuntu Linux
Severity
9.8CRITICALNVD
OSV5.5
EPSS
0.7%
top 28.74%
CISA KEV
Not in KEV
Exploit
No known exploits
Affected products
Timeline
PublishedNov 23
Latest updateMay 14
Description
Git before 2.19.2 on Linux and UNIX executes commands from the current working directory (as if '.' were at the end of $PATH) in certain cases involving the run_command() API and run-command.c, because there was a dangerous change from execvp to execv during 2017.
CVSS vector
CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:HExploitability: 3.9 | Impact: 5.9
Affected Packages3 packages
Also affects: Ubuntu Linux 18.04, 18.10
Patches
🔴Vulnerability Details
4📋Vendor Advisories
3💬Community
3Bugzilla▶
CVE-2018-19486 git: Improper handling of PATH allows for commands to be executed from the current directory [fedora-all]↗2018-11-26
Bugzilla▶
CVE-2018-19486 git: Improper handling of PATH allows for commands to be executed from the current directory↗2018-11-26
Bugzilla▶
CVE-2018-19486 git: Improper handling of PATH allows for commands to be executed from the current directory [epel-all]↗2018-11-26