exploitdb
WORKING POC
VERIFIED
by Metasploit · rubyremotepython
https://www.exploit-db.com/exploits/42599
This Metasploit module exploits CVE-2017-1000117 by creating a malicious Git repository with a crafted submodule URL that injects commands via the SSH ProxyCommand parameter when cloned. It simulates a Git HTTP server to deliver the exploit payload.
Classification
Working Poc 100%
Target:
Git versions 2.7.5 and lower
No auth needed
Prerequisites:
Victim must clone the malicious repository and initialize submodules
nomisec
WORKING POC
136 stars
by greymd · poc
https://github.com/greymd/CVE-2017-1000117
This repository demonstrates CVE-2017-1000117, a vulnerability in Git where malicious .gitmodules content can execute arbitrary commands during a recursive clone. The PoC triggers the execution of a command that prints a message to the terminal.
Classification
Working Poc 90%
Target:
Git (versions before 2.10.5, 2.11.4, 2.12.3, 2.13.1)
No auth needed
Prerequisites:
Git installed on the target system · User performs a recursive clone of the malicious repository
nomisec
SUSPICIOUS
16 stars
by Manouchehri · poc
https://github.com/Manouchehri/CVE-2017-1000117
The repository lacks actual exploit code and instead provides vague commands to clone another repository and read a file, which is indicative of a social engineering lure rather than a legitimate PoC.
Classification
Suspicious 90%
Target:
unspecified
No auth needed
Prerequisites:
none specified
nomisec
WORKING POC
7 stars
by timwr · poc
https://github.com/timwr/CVE-2017-1000117
This repository contains a functional proof-of-concept exploit for CVE-2017-1000117, a vulnerability in Git that allows arbitrary command execution via malicious SSH URLs in submodule configurations. The exploit leverages a crafted submodule URL to execute commands on the target system during a Git clone operation.
Classification
Working Poc 100%
Target:
Git (versions before 2.10.5, 2.11.4, 2.12.5, 2.13.6, 2.14.4)
No auth needed
Prerequisites:
Git client with vulnerable version installed · Network access to the target system
nomisec
WORKING POC
4 stars
by ieee0824 · poc
https://github.com/ieee0824/CVE-2017-1000117
This repository demonstrates a vulnerability in Git where a malicious repository can execute arbitrary commands (e.g., `ifconfig`) during a recursive clone operation. The exploit leverages a crafted `.gitmodules` file to trigger command execution via a maliciously named submodule.
Classification
Working Poc 90%
Target:
Git (versions prior to fix for CVE-2017-1000117)
No auth needed
Prerequisites:
Victim must perform a `git clone --recursive` on the malicious repository
nomisec
WORKING POC
3 stars
by AnonymKing · poc
https://github.com/AnonymKing/CVE-2017-1000117
This repository demonstrates a command injection vulnerability in Git (CVE-2017-1000117) by exploiting improper parsing of SSH URLs, allowing arbitrary command execution during submodule cloning.
Classification
Working Poc 90%
Target:
Git versions before 2.7.5
No auth needed
Prerequisites:
Vulnerable Git version installed · Ability to trigger a git clone with a malicious submodule URL
nomisec
WORKING POC
3 stars
by VulApps · poc
https://github.com/VulApps/CVE-2017-1000117
This repository contains a proof-of-concept exploit for CVE-2017-1000117, which targets a vulnerability in the SSH server implementation. The exploit writes the output of the `id` command to a file named `vul` in `/var/www/html`.
Classification
Working Poc 80%
Target:
SSH server (specific version not specified)
No auth needed
Prerequisites:
Access to a vulnerable SSH server
gitlab
WORKING POC
2 stars
by joernchen · poc
https://gitlab.com/joernchen/CVE-2017-1000117
This repository provides a functional PoC for CVE-2017-1000117, a vulnerability in Git that allows arbitrary command execution during a recursive clone. The exploit writes the output of the `id` command to a file in `/tmp/`.
Classification
Working Poc 80%
Target:
Git (versions before 2.14.2, 2.13.5, 2.12.4, 2.11.3, 2.10.4)
No auth needed
Prerequisites:
git installed on the target system · ability to execute `git clone --recursive`
github
WORKING POC
2 stars
by BasyacatX · pythonpoc
https://github.com/BasyacatX/CVE-2024-32002-PoC_Chinese/tree/main/CVE-2017-1000117.rb
This is a functional Metasploit module that exploits CVE-2017-1000117 by creating a malicious Git repository with a crafted submodule URL. The exploit triggers command injection when the submodule is cloned, leveraging the SSH ProxyCommand feature to execute arbitrary commands.
Classification
Working Poc 100%
Target:
Git versions 2.7.5 and lower
No auth needed
Prerequisites:
Victim must clone the malicious repository and initialize submodules
nomisec
SUSPICIOUS
2 stars
by nkoneko · poc
https://github.com/nkoneko/CVE-2017-1000117
The repository lacks actual exploit code and instead instructs users to clone another repository, which is a common social engineering tactic. No technical details about CVE-2017-1000117 are provided.
Classification
Suspicious 90%
Target:
Git (versions affected by CVE-2017-1000117)
No auth needed
Prerequisites:
User interaction to clone external repository
nomisec
WORKING POC
1 stars
by leezp · poc
https://github.com/leezp/CVE-2017-1000117
This repository demonstrates a command injection vulnerability in Git (CVE-2017-1000117) via maliciously crafted SSH URLs in .gitmodules files. The exploit leverages the ProxyCommand feature to execute arbitrary commands when a victim performs a recursive Git clone.
Classification
Working Poc 90%
Target:
Git (versions before 2.10.5, 2.11.4, 2.12.3, 2.13.1)
No auth needed
Prerequisites:
Victim must perform a recursive Git clone (--recursive or --recurse-submodules) · Attacker must control a malicious Git repository with a crafted .gitmodules file
nomisec
STUB
1 stars
by sasairc · poc
https://github.com/sasairc/CVE-2017-1000117_wasawasa
This repository is a placeholder for testing Git's vulnerability CVE-2017-1000117 but contains no actual exploit code or technical details. It references another repository as the original source.
Target:
Git
No auth needed
Prerequisites:
Git installed
gitlab
WORKING POC
by pnigos · poc
https://gitlab.com/pnigos/CVE-2017-1000117
This repository provides a proof-of-concept exploit for CVE-2017-1000117, which involves a vulnerability in Git's recursive clone functionality. The exploit writes the output of the `id` command to a file named `Dagobert` in `/tmp/`.
Classification
Working Poc 80%
Target:
Git (versions affected by CVE-2017-1000117)
No auth needed
Prerequisites:
Git installed on the target system · Ability to execute `git clone --recursive`
gitlab
SUSPICIOUS
by hrnry · poc
https://gitlab.com/hrnry/CVE-2017-1000117
The repository contains only a README with a link to an external GitLab repository, lacking any actual exploit code or technical details. This is characteristic of a social engineering lure.
Classification
Suspicious 90%
Target:
unknown
No auth needed
nomisec
WORKING POC
by Jerry-zhuang · poc
https://github.com/Jerry-zhuang/CVE-2017-1000117
This repository contains a functional PoC for CVE-2017-1000117, a vulnerability in OpenSSH's PAM module that allows local privilege escalation. The exploit writes the output of the `id` command to a file in `/var/www/html`, demonstrating arbitrary command execution.
Classification
Working Poc 80%
Target:
OpenSSH with PAM module (versions before 7.5p1)
Auth required
Prerequisites:
Local access to the target system · OpenSSH with vulnerable PAM module
nomisec
STUB
by cved-sources · poc
https://github.com/cved-sources/cve-2017-1000117
The repository contains only a Dockerfile and a README with minimal content, providing no exploit code or technical details about CVE-2017-1000117. It appears to be a placeholder for a vulnerable container setup without functional exploit demonstration.
Target:
unspecified
No auth needed
nomisec
SUSPICIOUS
by chu1337 · poc
https://github.com/chu1337/CVE-2017-1000117
The repository contains a README with a git clone command pointing to an external source and a trivial poc.sh script that opens a calculator app, which is unrelated to the CVE. No actual exploit code or technical details are provided.
Classification
Suspicious 90%
Target:
unknown
No auth needed
Prerequisites:
none
nomisec
WORKING POC
by siling2017 · poc
https://github.com/siling2017/CVE-2017-1000117
This repository contains a PoC for CVE-2017-1000117, a vulnerability in SSH servers that allows writing the output of the `id` command to a file. The exploit is designed to work with VulApps, a vulnerable application environment.
Classification
Working Poc 80%
Target:
SSH servers (specific version not specified)
No auth needed
Prerequisites:
Access to a vulnerable SSH server · Ability to execute the exploit script
nomisec
WORKING POC
by thelastbyte · poc
https://github.com/thelastbyte/CVE-2017-1000117
This repository contains a functional PoC for CVE-2017-1000117, a vulnerability in Git clients < v2.14.1 that allows arbitrary command execution during recursive clone operations. The exploit demonstrates copying /etc/passwd to /tmp/pwned.txt as proof of RCE.
Classification
Working Poc 90%
Target:
Git < v2.14.1
No auth needed
Prerequisites:
Git client < v2.14.1 · Network access to clone the malicious repository
nomisec
STUB
by chenzhuo0618 · poc
https://github.com/chenzhuo0618/test
The repository contains only a minimal README with no exploit code or technical details. It appears to be a placeholder or test repository.
Target:
unknown
No auth needed
nomisec
WORKING POC
by Shadow5523 · poc
https://github.com/Shadow5523/CVE-2017-1000117-test
This repository contains a functional exploit for CVE-2017-1000117, which leverages a Git submodule vulnerability to execute arbitrary code during a recursive clone. The exploit starts a Python HTTP server on port 12345 and modifies the /etc/hosts file.
Classification
Working Poc 95%
Target:
Git (versions prior to the fix for CVE-2017-1000117)
No auth needed
Prerequisites:
Git installed on the target system · Recursive clone with --recurse option
nomisec
STUB
by takehaya · poc
https://github.com/takehaya/CVE-2017-1000117
The repository contains only a README.md file with minimal content (just the CVE identifier) and no exploit code or technical details. It appears to be a placeholder or incomplete submission.
Target:
unknown
No auth needed
nomisec
WORKING POC
by shogo82148 · poc
https://github.com/shogo82148/Fix-CVE-2017-1000117
This repository demonstrates CVE-2017-1000117, a Git vulnerability where malicious .gitmodules files can execute arbitrary commands during recursive clone. The exploit uses a crafted submodule URL with a ProxyCommand to decode and execute a base64-encoded script (upgrade.sh).
Classification
Working Poc 95%
Target:
Git (versions before 2.10.5, 2.11.4, 2.12.5, 2.13.6, 2.14.2)
No auth needed
Prerequisites:
Victim must run 'git clone --recursive' on the malicious repository
nomisec
WORKING POC
by ikmski · poc
https://github.com/ikmski/CVE-2017-1000117
This repository demonstrates CVE-2017-1000117, a vulnerability in Git where malicious submodule URLs can execute arbitrary commands during submodule operations. The exploit leverages the ProxyCommand feature in SSH URLs to decode and execute a base64-encoded, gzip-compressed payload.
Classification
Working Poc 90%
Target:
Git (versions before 2.10.5, 2.11.4, 2.12.3, 2.13.1)
No auth needed
Prerequisites:
Git installed on the target system · Ability to clone a malicious repository
nomisec
STUB
by ieee0824 · poc
https://github.com/ieee0824/CVE-2017-1000117-sl
The repository contains a Dockerfile and a minimal README but lacks actual exploit code or technical details about CVE-2017-1000117. It appears to be a placeholder or build environment setup without functional PoC code.
Target:
Unknown (CVE-2017-1000117)
No auth needed
Prerequisites:
Docker environment
nomisec
SUSPICIOUS
by rootclay · poc
https://github.com/rootclay/CVE-2017-1000117
The repository contains a reverse shell script without any context or technical details about CVE-2017-1000117. The README is minimal and lacks legitimate vulnerability analysis.
Classification
Suspicious 90%
Target:
unspecified
No auth needed
Prerequisites:
unspecified
metasploit
WORKING POC
EXCELLENT
rubypoc
https://github.com/rapid7/metasploit-framework/blob/master/modules/exploits/multi/http/git_submodule_command_exec.rb
This Metasploit module exploits CVE-2017-1000117 by creating a malicious Git repository with a crafted submodule that injects commands via the SSH ProxyCommand parameter when cloned. It triggers RCE by leveraging incorrect parameter handling in Git versions 2.7.5 and below.
Classification
Working Poc 100%
Target:
Git versions 2.7.5 and below
No auth needed
Prerequisites:
Victim must clone the malicious repository · Git client must be vulnerable (version <= 2.7.5)