@@ -13,17 +13,27 @@ class Metasploit4 < Msf::Exploit::Remote
13
13
def initialize ( info = { } )
14
14
super ( update_info (
15
15
info ,
16
- 'Name' => 'Malicious Git HTTP Server For CVE-2014-9390' ,
16
+ 'Name' => 'Malicious Git and Mercurial HTTP Server For CVE-2014-9390' ,
17
17
'Description' => %q(
18
- This module exploits CVE-2014-9390, which affects Git versions less
19
- than 1.8.5.6, 1.9.5, 2.0.5, 2.1.4 and 2.2.1 on operating systems which
20
- have case-insensitive file systems like Windows and OS X. Because the
21
- file system is case-insensitive, sensitive files in the .git directory
22
- can be overwritten by other files which live in a server-side .git
23
- directory which only differs in case (for example, .giT). This results
24
- in all manner of potential consequences, including remote code
25
- execution.
26
- ) ,
18
+ This module exploits CVE-2014-9390, which affects Git (versions less
19
+ than 1.8.5.6, 1.9.5, 2.0.5, 2.1.4 and 2.2.1) and Mercurial (versions
20
+ less than 3.2.3) and describes three vulnerabilities.
21
+
22
+ On operating systems which have case-insensitive file systems, like
23
+ Windows and OS X, Git clients can be convinced to retrieve and
24
+ overwrite sensitive configuration files in the .git
25
+ directory which can allow arbitrary code execution if a vulnerable
26
+ client can be convinced to perform certain actions (for example,
27
+ a checkout) against a malicious Git repository.
28
+
29
+ A second vulnerability with similar characteristics also exists in both
30
+ Git and Mercurial clients, on HFS+ file systems (Mac OS X) only, where
31
+ certain Unicode codepoints are ignorable.
32
+
33
+ The third vulnerability with similar characteristics only affects
34
+ Mercurial clients on Windows, where Windows "short names"
35
+ (MS-DOS-compatible 8.3 format) are supported.
36
+ ) ,
27
37
'License' => MSF_LICENSE ,
28
38
'Author' => [
29
39
'Jon Hart <jon_hart[at]rapid7.com>' # metasploit module
@@ -32,7 +42,11 @@ def initialize(info = {})
32
42
[
33
43
[ 'CVE' , '2014-9390' ] ,
34
44
[ 'URL' , 'http://git-blame.blogspot.com.es/2014/12/git-1856-195-205-214-and-221-and.html' ] ,
35
- [ 'URL' , 'https://www.mehmetince.net/one-git-command-may-cause-you-hacked-cve-2014-9390-exploitation-for-shell/' ]
45
+ [ 'URL' , 'https://www.mehmetince.net/one-git-command-may-cause-you-hacked-cve-2014-9390-exploitation-for-shell/' ] ,
46
+ [ 'URL' , 'http://mercurial.selenic.com/wiki/WhatsNew#Mercurial_3.2.3_.282014-12-18.29' ] ,
47
+ [ 'URL' , 'http://selenic.com/repo/hg-stable/rev/c02a05cc6f5e' ] ,
48
+ [ 'URL' , 'http://selenic.com/repo/hg-stable/rev/6dad422ecc5a' ]
49
+
36
50
] ,
37
51
'DisclosureDate' => 'Dec 18 2014' ,
38
52
# TODO: correct all of this
0 commit comments