git-fastclone before 1.0.5 passes user modifiable strings directly to a shell command. An attacker can execute malicious commands by modifying the strings that are passed as arguments to "cd " and "git clone " commands in the library.
References
Link Resource
http://www.securityfocus.com/bid/81433 Third Party Advisory VDB Entry
https://github.com/square/git-fastclone/pull/5 Vendor Advisory
https://hackerone.com/reports/105190 Exploit Third Party Advisory
History

No history.

cve-icon MITRE Information

Status: PUBLISHED

Assigner: hackerone

Published: 2016-11-03T10:00:00

Updated: 2016-11-25T19:57:01

Reserved: 2016-11-02T00:00:00


Link: CVE-2015-8969

JSON object: View

cve-icon NVD Information

Status : Analyzed

Published: 2016-11-03T10:59:01.433

Modified: 2020-06-10T13:35:48.743


Link: CVE-2015-8969

JSON object: View

cve-icon Redhat Information

No data.

CWE