The package weblate from 0 and before 4.11.1 are vulnerable to Remote Code Execution (RCE) via argument injection when using git or mercurial repositories. Authenticated users, can change the behavior of the application in an unintended way, leading to command execution.
Metrics
Affected Vendors & Products
Advisories
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2022-0360 | The package weblate from 0 and before 4.11.1 are vulnerable to Remote Code Execution (RCE) via argument injection when using git or mercurial repositories. Authenticated users, can change the behavior of the application in an unintended way, leading to command execution.\n |
EUVD |
EUVD-2022-0361 | The package weblate from 0 and before 4.11.1 are vulnerable to Remote Code Execution (RCE) via argument injection when using git or mercurial repositories. Authenticated users, can change the behavior of the application in an unintended way, leading to command execution.\n |
Github GHSA |
GHSA-3872-f48p-pxqj | Improper Neutralization of Special Elements used in a Command ('Command Injection') in Weblate |
Fixes
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
References
History
No history.
Status: PUBLISHED
Assigner: snyk
Published:
Updated: 2024-09-17T00:10:54.741Z
Reserved: 2022-02-24T00:00:00
Link: CVE-2022-23915
No data.
Status : Modified
Published: 2022-03-04T20:15:07.757
Modified: 2024-11-21T06:49:27.273
Link: CVE-2022-23915
No data.
OpenCVE Enrichment
No data.
EUVD
Github GHSA