Vulnerability Name:

CVE-2010-0394 (CCN-56105)

Assigned:2010-01-26
Published:2010-01-26
Updated:2017-08-17
Summary:PyGIT.py in the Trac Git plugin (trac-git) before 0.0.20080710-3+lenny1 and before 0.0.20090320-1 on Debian GNU/Linux, when enabled in Trac, allows remote attackers to execute arbitrary commands via shell metacharacters in a crafted HTTP query that is used to generate a certain git command.
CVSS v3 Severity:7.3 High (CCN CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L)
Exploitability Metrics:Attack Vector (AV): Network
Attack Complexity (AC): Low
Privileges Required (PR): None
User Interaction (UI): None
Scope:Scope (S): Unchanged
Impact Metrics:Confidentiality (C): Low
Integrity (I): Low
Availibility (A): Low
CVSS v2 Severity:6.8 Medium (CVSS v2 Vector: AV:N/AC:M/Au:N/C:P/I:P/A:P)
5.0 Medium (Temporal CVSS v2 Vector: AV:N/AC:M/Au:N/C:P/I:P/A:P/E:U/RL:OF/RC:C)
Exploitability Metrics:Access Vector (AV): Network
Access Complexity (AC): Medium
Authentication (Au): None
Impact Metrics:Confidentiality (C): Partial
Integrity (I): Partial
Availibility (A): Partial
6.8 Medium (CCN CVSS v2 Vector: AV:N/AC:M/Au:N/C:P/I:P/A:P)
5.0 Medium (CCN Temporal CVSS v2 Vector: AV:N/AC:M/Au:N/C:P/I:P/A:P/E:U/RL:OF/RC:C)
Exploitability Metrics:Access Vector (AV): Network
Access Complexity (AC): Medium
Athentication (Au): None
Impact Metrics:Confidentiality (C): Partial
Integrity (I): Partial
Availibility (A): Partial
Vulnerability Type:CWE-20
Vulnerability Consequences:Gain Access
References:Source: CCN
Type: Debian Bug report logs - #567039
trac-git: Arbitrary command execution

Source: CONFIRM
Type: UNKNOWN
http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=567039

Source: MITRE
Type: CNA
CVE-2010-0394

Source: CCN
Type: Edgewall Software Web site
Trac Git Plugin

Source: OSVDB
Type: UNKNOWN
62147

Source: SECUNIA
Type: Vendor Advisory
38325

Source: DEBIAN
Type: UNKNOWN
DSA-1990

Source: DEBIAN
Type: DSA-1990
trac-git -- shell command injection

Source: CCN
Type: OSVDB ID: 62147
trac-git PyGIT.py HTTP Request Arbitrary Shell Command Injection

Source: BID
Type: UNKNOWN
38076

Source: CCN
Type: BID-38076
Trac Git Plugin Remote Command Injection Vulnerability

Source: XF
Type: UNKNOWN
tracgit-command-execution(56105)

Source: XF
Type: UNKNOWN
tracgit-command-execution(56105)

Vulnerable Configuration:Configuration 1:
  • cpe:/a:nanosleep:trac-git:*:*:*:*:*:*:*:* (Version <= 0.0.20080710)
  • OR cpe:/a:nanosleep:trac-git:*:*:*:*:*:*:*:* (Version <= 0.0.20090320)
  • AND
  • cpe:/a:edgewall_software:trac:*:*:*:*:*:*:*:*
  • OR cpe:/o:debian:debian_linux:*:*:*:*:*:*:*:*

  • * Denotes that component is vulnerable
    Oval Definitions
    Definition IDClassTitleLast Modified
    oval:org.mitre.oval:def:7189
    P
    DSA-1990 trac-git -- shell command injection
    2014-06-23
    oval:org.mitre.oval:def:13335
    P
    DSA-1990-1 trac-git -- shell command injection
    2014-06-23
    oval:org.mitre.oval:def:13368
    P
    DSA-1990-2 trac-git -- shell command injection
    2014-06-23
    oval:org.debian:def:1990
    V
    shell command injection
    2010-02-03
    BACK
    nanosleep trac-git *
    nanosleep trac-git *
    edgewall_software trac *
    debian debian linux *