ID CVE-2017-16228
Summary Dulwich before 0.18.5, when an SSH subprocess is used, allows remote attackers to execute arbitrary commands via an ssh URL with an initial dash character in the hostname, a related issue to CVE-2017-9800, CVE-2017-12836, CVE-2017-12976, CVE-2017-1000116, and CVE-2017-1000117.
References
Vulnerable Configurations
  • cpe:2.3:a:dulwich_project:dulwich:0.1.0:*:*:*:*:*:*:*
    cpe:2.3:a:dulwich_project:dulwich:0.1.0:*:*:*:*:*:*:*
  • cpe:2.3:a:dulwich_project:dulwich:0.1.1:*:*:*:*:*:*:*
    cpe:2.3:a:dulwich_project:dulwich:0.1.1:*:*:*:*:*:*:*
  • cpe:2.3:a:dulwich_project:dulwich:0.2.0:*:*:*:*:*:*:*
    cpe:2.3:a:dulwich_project:dulwich:0.2.0:*:*:*:*:*:*:*
  • cpe:2.3:a:dulwich_project:dulwich:0.2.1:*:*:*:*:*:*:*
    cpe:2.3:a:dulwich_project:dulwich:0.2.1:*:*:*:*:*:*:*
  • cpe:2.3:a:dulwich_project:dulwich:0.3.0:*:*:*:*:*:*:*
    cpe:2.3:a:dulwich_project:dulwich:0.3.0:*:*:*:*:*:*:*
  • cpe:2.3:a:dulwich_project:dulwich:0.3.1:*:*:*:*:*:*:*
    cpe:2.3:a:dulwich_project:dulwich:0.3.1:*:*:*:*:*:*:*
  • cpe:2.3:a:dulwich_project:dulwich:0.3.2:*:*:*:*:*:*:*
    cpe:2.3:a:dulwich_project:dulwich:0.3.2:*:*:*:*:*:*:*
  • cpe:2.3:a:dulwich_project:dulwich:0.3.3:*:*:*:*:*:*:*
    cpe:2.3:a:dulwich_project:dulwich:0.3.3:*:*:*:*:*:*:*
  • cpe:2.3:a:dulwich_project:dulwich:0.4.0:*:*:*:*:*:*:*
    cpe:2.3:a:dulwich_project:dulwich:0.4.0:*:*:*:*:*:*:*
  • cpe:2.3:a:dulwich_project:dulwich:0.4.1:*:*:*:*:*:*:*
    cpe:2.3:a:dulwich_project:dulwich:0.4.1:*:*:*:*:*:*:*
  • cpe:2.3:a:dulwich_project:dulwich:0.5.0:*:*:*:*:*:*:*
    cpe:2.3:a:dulwich_project:dulwich:0.5.0:*:*:*:*:*:*:*
  • cpe:2.3:a:dulwich_project:dulwich:0.6.0:*:*:*:*:*:*:*
    cpe:2.3:a:dulwich_project:dulwich:0.6.0:*:*:*:*:*:*:*
  • cpe:2.3:a:dulwich_project:dulwich:0.6.1:*:*:*:*:*:*:*
    cpe:2.3:a:dulwich_project:dulwich:0.6.1:*:*:*:*:*:*:*
  • cpe:2.3:a:dulwich_project:dulwich:0.6.2:*:*:*:*:*:*:*
    cpe:2.3:a:dulwich_project:dulwich:0.6.2:*:*:*:*:*:*:*
  • cpe:2.3:a:dulwich_project:dulwich:0.7.0:*:*:*:*:*:*:*
    cpe:2.3:a:dulwich_project:dulwich:0.7.0:*:*:*:*:*:*:*
  • cpe:2.3:a:dulwich_project:dulwich:0.7.1:*:*:*:*:*:*:*
    cpe:2.3:a:dulwich_project:dulwich:0.7.1:*:*:*:*:*:*:*
  • cpe:2.3:a:dulwich_project:dulwich:0.8.0:*:*:*:*:*:*:*
    cpe:2.3:a:dulwich_project:dulwich:0.8.0:*:*:*:*:*:*:*
  • cpe:2.3:a:dulwich_project:dulwich:0.8.1:*:*:*:*:*:*:*
    cpe:2.3:a:dulwich_project:dulwich:0.8.1:*:*:*:*:*:*:*
  • cpe:2.3:a:dulwich_project:dulwich:0.8.2:*:*:*:*:*:*:*
    cpe:2.3:a:dulwich_project:dulwich:0.8.2:*:*:*:*:*:*:*
  • cpe:2.3:a:dulwich_project:dulwich:0.8.3:*:*:*:*:*:*:*
    cpe:2.3:a:dulwich_project:dulwich:0.8.3:*:*:*:*:*:*:*
  • cpe:2.3:a:dulwich_project:dulwich:0.8.4:*:*:*:*:*:*:*
    cpe:2.3:a:dulwich_project:dulwich:0.8.4:*:*:*:*:*:*:*
  • cpe:2.3:a:dulwich_project:dulwich:0.8.5:*:*:*:*:*:*:*
    cpe:2.3:a:dulwich_project:dulwich:0.8.5:*:*:*:*:*:*:*
  • cpe:2.3:a:dulwich_project:dulwich:0.8.6:*:*:*:*:*:*:*
    cpe:2.3:a:dulwich_project:dulwich:0.8.6:*:*:*:*:*:*:*
  • cpe:2.3:a:dulwich_project:dulwich:0.8.7:*:*:*:*:*:*:*
    cpe:2.3:a:dulwich_project:dulwich:0.8.7:*:*:*:*:*:*:*
  • cpe:2.3:a:dulwich_project:dulwich:0.9.0:*:*:*:*:*:*:*
    cpe:2.3:a:dulwich_project:dulwich:0.9.0:*:*:*:*:*:*:*
  • cpe:2.3:a:dulwich_project:dulwich:0.9.1:*:*:*:*:*:*:*
    cpe:2.3:a:dulwich_project:dulwich:0.9.1:*:*:*:*:*:*:*
  • cpe:2.3:a:dulwich_project:dulwich:0.9.2:*:*:*:*:*:*:*
    cpe:2.3:a:dulwich_project:dulwich:0.9.2:*:*:*:*:*:*:*
  • cpe:2.3:a:dulwich_project:dulwich:0.9.3:*:*:*:*:*:*:*
    cpe:2.3:a:dulwich_project:dulwich:0.9.3:*:*:*:*:*:*:*
  • cpe:2.3:a:dulwich_project:dulwich:0.9.4:*:*:*:*:*:*:*
    cpe:2.3:a:dulwich_project:dulwich:0.9.4:*:*:*:*:*:*:*
  • cpe:2.3:a:dulwich_project:dulwich:0.9.5:*:*:*:*:*:*:*
    cpe:2.3:a:dulwich_project:dulwich:0.9.5:*:*:*:*:*:*:*
  • cpe:2.3:a:dulwich_project:dulwich:0.9.6:*:*:*:*:*:*:*
    cpe:2.3:a:dulwich_project:dulwich:0.9.6:*:*:*:*:*:*:*
  • cpe:2.3:a:dulwich_project:dulwich:0.9.7:*:*:*:*:*:*:*
    cpe:2.3:a:dulwich_project:dulwich:0.9.7:*:*:*:*:*:*:*
  • cpe:2.3:a:dulwich_project:dulwich:0.9.8:*:*:*:*:*:*:*
    cpe:2.3:a:dulwich_project:dulwich:0.9.8:*:*:*:*:*:*:*
  • cpe:2.3:a:dulwich_project:dulwich:0.9.9:*:*:*:*:*:*:*
    cpe:2.3:a:dulwich_project:dulwich:0.9.9:*:*:*:*:*:*:*
  • cpe:2.3:a:dulwich_project:dulwich:0.9.10:*:*:*:*:*:*:*
    cpe:2.3:a:dulwich_project:dulwich:0.9.10:*:*:*:*:*:*:*
  • cpe:2.3:a:dulwich_project:dulwich:0.10.0:*:*:*:*:*:*:*
    cpe:2.3:a:dulwich_project:dulwich:0.10.0:*:*:*:*:*:*:*
  • cpe:2.3:a:dulwich_project:dulwich:0.10.1:*:*:*:*:*:*:*
    cpe:2.3:a:dulwich_project:dulwich:0.10.1:*:*:*:*:*:*:*
  • cpe:2.3:a:dulwich_project:dulwich:0.11.0:*:*:*:*:*:*:*
    cpe:2.3:a:dulwich_project:dulwich:0.11.0:*:*:*:*:*:*:*
  • cpe:2.3:a:dulwich_project:dulwich:0.11.1:*:*:*:*:*:*:*
    cpe:2.3:a:dulwich_project:dulwich:0.11.1:*:*:*:*:*:*:*
  • cpe:2.3:a:dulwich_project:dulwich:0.12.0:*:*:*:*:*:*:*
    cpe:2.3:a:dulwich_project:dulwich:0.12.0:*:*:*:*:*:*:*
  • cpe:2.3:a:dulwich_project:dulwich:0.13.0:*:*:*:*:*:*:*
    cpe:2.3:a:dulwich_project:dulwich:0.13.0:*:*:*:*:*:*:*
  • cpe:2.3:a:dulwich_project:dulwich:0.14.0:*:*:*:*:*:*:*
    cpe:2.3:a:dulwich_project:dulwich:0.14.0:*:*:*:*:*:*:*
  • cpe:2.3:a:dulwich_project:dulwich:0.14.1:*:*:*:*:*:*:*
    cpe:2.3:a:dulwich_project:dulwich:0.14.1:*:*:*:*:*:*:*
  • cpe:2.3:a:dulwich_project:dulwich:0.15.0:*:*:*:*:*:*:*
    cpe:2.3:a:dulwich_project:dulwich:0.15.0:*:*:*:*:*:*:*
  • cpe:2.3:a:dulwich_project:dulwich:0.16.0:*:*:*:*:*:*:*
    cpe:2.3:a:dulwich_project:dulwich:0.16.0:*:*:*:*:*:*:*
  • cpe:2.3:a:dulwich_project:dulwich:0.16.1:*:*:*:*:*:*:*
    cpe:2.3:a:dulwich_project:dulwich:0.16.1:*:*:*:*:*:*:*
  • cpe:2.3:a:dulwich_project:dulwich:0.16.2:*:*:*:*:*:*:*
    cpe:2.3:a:dulwich_project:dulwich:0.16.2:*:*:*:*:*:*:*
  • cpe:2.3:a:dulwich_project:dulwich:0.16.3:*:*:*:*:*:*:*
    cpe:2.3:a:dulwich_project:dulwich:0.16.3:*:*:*:*:*:*:*
  • cpe:2.3:a:dulwich_project:dulwich:0.17.0:*:*:*:*:*:*:*
    cpe:2.3:a:dulwich_project:dulwich:0.17.0:*:*:*:*:*:*:*
  • cpe:2.3:a:dulwich_project:dulwich:0.17.1:*:*:*:*:*:*:*
    cpe:2.3:a:dulwich_project:dulwich:0.17.1:*:*:*:*:*:*:*
  • cpe:2.3:a:dulwich_project:dulwich:0.17.2:*:*:*:*:*:*:*
    cpe:2.3:a:dulwich_project:dulwich:0.17.2:*:*:*:*:*:*:*
  • cpe:2.3:a:dulwich_project:dulwich:0.17.3:*:*:*:*:*:*:*
    cpe:2.3:a:dulwich_project:dulwich:0.17.3:*:*:*:*:*:*:*
  • cpe:2.3:a:dulwich_project:dulwich:0.18.0:*:*:*:*:*:*:*
    cpe:2.3:a:dulwich_project:dulwich:0.18.0:*:*:*:*:*:*:*
  • cpe:2.3:a:dulwich_project:dulwich:0.18.1:*:*:*:*:*:*:*
    cpe:2.3:a:dulwich_project:dulwich:0.18.1:*:*:*:*:*:*:*
  • cpe:2.3:a:dulwich_project:dulwich:0.18.2:*:*:*:*:*:*:*
    cpe:2.3:a:dulwich_project:dulwich:0.18.2:*:*:*:*:*:*:*
  • cpe:2.3:a:dulwich_project:dulwich:0.18.3:*:*:*:*:*:*:*
    cpe:2.3:a:dulwich_project:dulwich:0.18.3:*:*:*:*:*:*:*
  • cpe:2.3:a:dulwich_project:dulwich:0.18.4:*:*:*:*:*:*:*
    cpe:2.3:a:dulwich_project:dulwich:0.18.4:*:*:*:*:*:*:*
CVSS
Base: 7.5 (as of 03-10-2019 - 00:03)
Impact:
Exploitability:
CWE NVD-CWE-noinfo
CAPEC
Access
VectorComplexityAuthentication
NETWORK LOW NONE
Impact
ConfidentialityIntegrityAvailability
PARTIAL PARTIAL PARTIAL
cvss-vector via4 AV:N/AC:L/Au:N/C:P/I:P/A:P
refmap via4
misc
Last major update 03-10-2019 - 00:03
Published 29-10-2017 - 20:29
Last modified 03-10-2019 - 00:03
Back to Top