i believe you meant -o here, not -e. -e is escape character, while -o is to change options.

This commit is contained in:
anarcat 2017-09-27 16:38:07 +00:00 committed by admin
parent 596698e138
commit b614f36873

View file

@ -2,14 +2,14 @@ git-annex was vulnerable to the same class of security hole as
git's CVE-2017-1000117. In several cases, git-annex parses a repository
url, and uses it to generate a ssh command, with the hostname to ssh to
coming from the url. If the hostname it parses is something like
"-eProxyCommand=evil", this could result in arbitrary local code execution
"-oProxyCommand=evil", this could result in arbitrary local code execution
via ssh.
I have not bothered to try to exploit the problem, and some details of URL
parsing may prevent the exploit working in some cases.
Exploiting this would involve the attacker tricking the victim into adding
a remote something like "ssh://-eProxyCommand=evil/blah".
a remote something like "ssh://-oProxyCommand=evil/blah".
One possible avenue for an attacker that avoids exposing the URL to the
user is to use initremote with a ssh remote, so embedding the URL in the