Description
The package libvcs before 0.11.1 are vulnerable to Command Injection via argument injection. When calling the update_repo function (when using hg), the url parameter is passed to the hg clone command. By injecting some hg options it was possible to get arbitrary command execution.
Published: 2022-03-14
Score: 8.1 High
EPSS: 1.3% Low
KEV: No
Impact: n/a
Action: n/a
AI Analysis

No analysis available yet.

Remediation

No remediation available yet.

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
EUVD EUVD EUVD-2022-0137 The package libvcs before 0.11.1 are vulnerable to Command Injection via argument injection. When calling the update_repo function (when using hg), the url parameter is passed to the hg clone command. By injecting some hg options it was possible to get arbitrary command execution.
Github GHSA Github GHSA GHSA-mv2w-4jqc-6fg4 Command injection in libvcs and vcspull
History

No history.

Subscriptions

Libvcs Project Libvcs
cve-icon MITRE

Status: PUBLISHED

Assigner: snyk

Published:

Updated: 2024-09-16T18:13:45.548Z

Reserved: 2022-02-24T00:00:00.000Z

Link: CVE-2022-21187

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Modified

Published: 2022-03-14T18:15:07.917

Modified: 2024-11-21T06:44:03.810

Link: CVE-2022-21187

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.

Weaknesses