{"id":"UBUNTU-CVE-2017-12976","details":"git-annex before 6.20170818 allows remote attackers to execute arbitrary commands via an ssh URL with an initial dash character in the hostname, as demonstrated by an ssh://-eProxyCommand= URL, a related issue to CVE-2017-9800, CVE-2017-12836, CVE-2017-1000116, and CVE-2017-1000117.","modified":"2025-10-24T04:46:27Z","published":"2017-08-20T20:29:00Z","upstream":["CVE-2017-12976"],"references":[{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2017-12976"},{"type":"REPORT","url":"http://source.git-annex.branchable.com/?p=source.git;a=commit;h=df11e54788b254efebb4898b474de11ae8d3b471"},{"type":"REPORT","url":"http://source.git-annex.branchable.com/?p=source.git;a=commit;h=c24d0f0e8984576654e2be149005bc884fe0403a"},{"type":"REPORT","url":"http://source.git-annex.branchable.com/?p=source.git;a=blob;f=doc/bugs/dashed_ssh_hostname_security_hole.mdwn"},{"type":"REPORT","url":"https://www.cve.org/CVERecord?id=CVE-2017-12976"}],"affected":[{"package":{"name":"git-annex","ecosystem":"Ubuntu:16.04:LTS","purl":"pkg:deb/ubuntu/git-annex@5.20151208-1build1?arch=source&distro=xenial"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"}]}],"versions":["5.20150731-1build1","5.20151208-1","5.20151208-1build1"],"ecosystem_specific":{"binaries":[{"binary_name":"git-annex","binary_version":"5.20151208-1build1"}]},"database_specific":{"source":"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/cve/2017/UBUNTU-CVE-2017-12976.json"}}],"schema_version":"1.7.3","severity":[{"type":"CVSS_V3","score":"CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"type":"Ubuntu","score":"medium"}]}