Impact
A Git repository can be crafted in such a way that with some social engineering a user who has cloned the repository can be tricked into running any script (e.g., Bourne shell, Perl, Python, ...) supplied by the attacker by invoking gitk filename
, where filename
has a particular structure. The script is run with the privileges of the user.
Patches
Workarounds
- Do not clone repositories from untrusted sources.
- Do not use Gitk.
References
Impact
A Git repository can be crafted in such a way that with some social engineering a user who has cloned the repository can be tricked into running any script (e.g., Bourne shell, Perl, Python, ...) supplied by the attacker by invoking
gitk filename
, wherefilename
has a particular structure. The script is run with the privileges of the user.Patches
Workarounds
References