push-dir through 0.4.1 allows execution of arbritary commands. Arguments provided as part of the variable "opt.branch" is not validated before being provided to the "git" command within "index.js#L139". This could be abused by an attacker to inject arbitrary commands.
Advisories
Source ID Title
EUVD EUVD EUVD-2022-0929 push-dir through 0.4.1 allows execution of arbritary commands. Arguments provided as part of the variable "opt.branch" is not validated before being provided to the "git" command within "index.js#L139". This could be abused by an attacker to inject arbitrary commands.
Github GHSA Github GHSA GHSA-926x-m6m5-3mmp push-dir Enables OS Command Injection
Fixes

Solution

No solution given by the vendor.


Workaround

No workaround given by the vendor.

History

No history.

Projects

Sign in to view the affected projects.

cve-icon MITRE

Status: PUBLISHED

Assigner: snyk

Published:

Updated: 2024-08-04T22:32:02.167Z

Reserved: 2019-04-03T00:00:00

Link: CVE-2019-10803

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Modified

Published: 2020-02-28T21:15:13.010

Modified: 2024-11-21T04:19:57.080

Link: CVE-2019-10803

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.

Weaknesses