diff --git a/modules/vulnerabilities/unix/webapp/gitlist_040/secgen_metadata.xml b/modules/vulnerabilities/unix/webapp/gitlist_040/secgen_metadata.xml index 19cf4ac15..08a0c0e5c 100644 --- a/modules/vulnerabilities/unix/webapp/gitlist_040/secgen_metadata.xml +++ b/modules/vulnerabilities/unix/webapp/gitlist_040/secgen_metadata.xml @@ -2,14 +2,13 @@ - + Gitlist 0.4.0 RCE Thomas Shaw MIT - Gitlist before 0.5.0 allows remote attackers to execute arbitrary commands via shell metacharacters in the file - name in the URI of a request for a (1) blame, (2) file, or (3) stats page, as demonstrated by requests to - blame/master/, master/, and stats/master/. + Gitlist versions 0.6 and below are vulnerable to an exploit where the attacker is able to bypass/exploit the + 'escapeshellarg' using argument injection, resulting in remote code execution. webapp @@ -48,13 +47,13 @@ - CVE-2014-4511 + CVE-2018-1000533 - 7.5 - AV:N/AC:L/Au:N/C:P/I:P/A:P + 9.8 + AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H - exploit/linux/http/gitlist_exec + exploit/multi/http/gitlist_arg_injection Visit the webapp in a browser at: ip:80/gitlist