RULE(RULE ID:323763)

Rule General Information
Release Date: 2019-11-28
Rule Name: GitList v0.6.0 Code Injection Vulnerability (CVE-2018-1000533)
Severity:
CVE ID:
Rule Protection Details
Description: klaussilveira GitList version <= 0.6 contains a Passing incorrectly sanitized input to system function vulnerability in `searchTree` function that can result in Execute any code as PHP user. This attack appear to be exploitable via Send POST request using search form. This vulnerability appears to have been fixed in 0.7 after commit 87b8c26b023c3fc37f0796b14bb13710f397b322.
Impact: An attacker could exploit this vulnerability to have unspecified effect.
Affected OS: Windows, Linux
Reference: https://github.com/klaussilveira/gitlist/commit/87b8c26b023c3fc37f0796b14bb13710f397b322
https://security.szurek.pl/exploit-bypass-php-escapeshellarg-escapeshellcmd.html
Solutions
The vendors have released upgrade patches to fix vulnerabilities, please visit:
https://github.com/klaussilveira/gitlist/commit/87b8c26b023c3fc37f0796b14bb13710f397b322