[Forgot Password]
Login  Register Subscribe

30481

 
 

423868

 
 

256288

 
 

909

 
 

199146

 
 

282

Paid content will be excluded from the download.


Download | Alert*
CVE
view JSON

CVE-2022-25648Date: (C)2022-04-20   (M)2024-04-19


The package git before 1.11.0 are vulnerable to Command Injection via git argument injection. When calling the fetch(remote = 'origin', opts = {}) function, the remote parameter is passed to the git fetch subcommand in a way that additional flags can be set. The additional flags can be used to perform a command injection.

CVSS Score and Metrics +CVSS Score and Metrics -

CVSS V3 Severity:CVSS V2 Severity:
CVSS Score : 9.8CVSS Score : 7.5
Exploit Score: 3.9Exploit Score: 10.0
Impact Score: 5.9Impact Score: 6.4
 
CVSS V3 Metrics:CVSS V2 Metrics:
Attack Vector: NETWORKAccess Vector: NETWORK
Attack Complexity: LOWAccess Complexity: LOW
Privileges Required: NONEAuthentication: NONE
User Interaction: NONEConfidentiality: PARTIAL
Scope: UNCHANGEDIntegrity: PARTIAL
Confidentiality: HIGHAvailability: PARTIAL
Integrity: HIGH 
Availability: HIGH 
  
Reference:
FEDORA-2022-1aa40056fc
FEDORA-2022-353e1cf8b6
FEDORA-2022-f09e0d8b0e
https://lists.debian.org/debian-lts-announce/2023/01/msg00043.html
https://github.com/ruby-git/ruby-git/pull/569
https://github.com/ruby-git/ruby-git/releases/tag/v1.11.0
https://snyk.io/vuln/SNYK-RUBY-GIT-2421270

CWE    1
CWE-88
OVAL    4
oval:org.secpod.oval:def:122391
oval:org.secpod.oval:def:122395
oval:org.secpod.oval:def:122398
oval:org.secpod.oval:def:4501094
...

© SecPod Technologies