CVE-2017-9800

CRITICAL Year: 2017
CVSS v3 Score
9.8
Critical
CVSS v2 Score
7.5
High

Vulnerability Description

A maliciously constructed svn+ssh:// URL would cause Subversion clients before 1.8.19, 1.9.x before 1.9.7, and 1.10.0.x through 1.10.0-alpha3 to run an arbitrary shell command. Such a URL could be generated by a malicious server, by a malicious user committing to a honest server (to attack another user of that server's repositories), or by a proxy server. The vulnerability affects all clients, including those that use file://, http://, and plain (untunneled) svn://.

CVSS:9.8(Critical)

Snoopy before 2.0.0 has a security hole in exec cURL

CWE-202002
CVSS:9.8(Critical)

Varnish 2.0.6 writes data to a log file without sanitizing non-printable characters, which might allow remote attackers to modify a window's title, or possibly execute arbitrary commands or overwrite ...

CWE-202009
CVSS:9.8(Critical)

thttpd 2.25b0 writes data to a log file without sanitizing non-printable characters, which might allow remote attackers to modify a window's title, or possibly execute arbitrary commands or overwrite ...

CWE-202009
CVSS:9.8(Critical)

Transmission before 1.92 allows an attacker to cause a denial of service (crash) or possibly have other unspecified impact via a large number of tr arguments in a magnet link.

CWE-202010
CVSS:9.8(Critical)

gitolite before 1.4.1 does not filter src/ or hooks/ from path names.

CWE-202010