The package git-pull-or-clone before 2.0.2 are vulnerable to Command Injection due to the use of the --upload-pack feature of git which is also supported for git clone. The source includes the use of the secure child process API spawn(). However, the outpath parameter passed to it may be a command-line argument to the git clone command and result in arbitrary command injection.
Advisories
Source ID Title
EUVD EUVD EUVD-2022-2257 The package git-pull-or-clone before 2.0.2 are vulnerable to Command Injection due to the use of the --upload-pack feature of git which is also supported for git clone. The source includes the use of the secure child process API spawn(). However, the outpath parameter passed to it may be a command-line argument to the git clone command and result in arbitrary command injection.
Github GHSA Github GHSA GHSA-3x62-x456-q2vm OS Command Injection in git-pull-or-clone
Fixes

Solution

No solution given by the vendor.


Workaround

No workaround given by the vendor.

History

No history.

cve-icon MITRE

Status: PUBLISHED

Assigner: snyk

Published:

Updated: 2024-09-16T19:15:08.649Z

Reserved: 2022-02-24T00:00:00

Link: CVE-2022-24437

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Modified

Published: 2022-05-01T16:15:08.423

Modified: 2024-11-21T06:50:25.170

Link: CVE-2022-24437

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.