{"id":"PYSEC-2016-28","details":"The convert extension in Mercurial before 3.8 might allow context-dependent attackers to execute arbitrary code via a crafted git repository name.","aliases":["CVE-2016-3105","GHSA-49cw-434h-qc57"],"modified":"2024-05-01T17:28:15.570672Z","published":"2016-05-09T20:59:00Z","references":[{"type":"WEB","url":"https://selenic.com/hg/rev/a56296f55a5e"},{"type":"WEB","url":"https://www.mercurial-scm.org/wiki/WhatsNew#Mercurial_3.8_.2F_3.8.1_.282016-5-1.29"},{"type":"ADVISORY","url":"http://www.debian.org/security/2016/dsa-3570"},{"type":"WEB","url":"http://www.securityfocus.com/bid/90536"},{"type":"WEB","url":"http://www.slackware.com/security/viewer.php?l=slackware-security&y=2016&m=slackware-security.533255"},{"type":"WEB","url":"http://lists.opensuse.org/opensuse-updates/2016-05/msg00082.html"},{"type":"ADVISORY","url":"https://security.gentoo.org/glsa/201612-19"}],"affected":[{"package":{"name":"mercurial","ecosystem":"PyPI","purl":"pkg:pypi/mercurial"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"3.8-rc"}]}],"versions":["0.8.1","0.9","0.9.1","0.9.2","0.9.3","0.9.4","0.9.5","1.0","1.0.1","1.0.2","1.1","1.1.1","1.1.2","1.2","1.2.1","1.3","1.3.1","1.4","1.4.1","1.4.2","1.4.3","1.5","1.5.1","1.5.2","1.5.3","1.5.4","1.6","1.6.1","1.6.2","1.6.3","1.6.4","1.7","1.7.1","1.7.2","1.7.3","1.7.5","1.8","1.8.1","1.8.2","1.8.3","1.8.4","1.9","1.9.1","1.9.2","1.9.3","2.0","2.0.1","2.0.2","2.1","2.1.1","2.1.2","2.2","2.2.2","2.3","2.4.1","2.5","2.5.1","2.5.2","2.6","2.6.1","2.6.2","2.6.3","2.7.0","2.7.1","2.7.2","2.8","2.8.1","2.8.2","2.9","2.9.1","3.0","3.0.1","3.1","3.1.1","3.1.2","3.2","3.2.1","3.2.2","3.2.3","3.2.4","3.3","3.3-rc","3.3.1","3.3.2","3.3.3","3.4","3.4-rc","3.4.1","3.4.2","3.5","3.5-rc","3.5.1","3.5.2","3.6","3.6-rc","3.6.1","3.6.2","3.6.3","3.7","3.7-rc","3.7.1","3.7.2","3.7.3"],"database_specific":{"source":"https://github.com/pypa/advisory-database/blob/main/vulns/mercurial/PYSEC-2016-28.yaml"}}],"schema_version":"1.7.3"}