Description
All versions of package gitpython are vulnerable to Remote Code Execution (RCE) due to improper user input validation, which makes it possible to inject a maliciously crafted remote URL into the clone command. Exploiting this vulnerability is possible because the library makes external calls to git without sufficient sanitization of input arguments.
No analysis available yet.
Remediation
No remediation available yet.
Tracking
Sign in to view the affected projects.
Advisories
| Source | ID | Title |
|---|---|---|
Debian DLA |
DLA-3502-1 | python-git security update |
Debian DLA |
DLA-3939-1 | python-git security update |
Github GHSA |
GHSA-hcpj-qp55-gfph | GitPython vulnerable to Remote Code Execution due to improper user input validation |
Ubuntu USN |
USN-5968-1 | GitPython vulnerability |
References
History
Mon, 03 Nov 2025 22:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| References |
|
Status: PUBLISHED
Assigner: snyk
Published:
Updated: 2025-11-03T21:46:05.215Z
Reserved: 2022-02-24T00:00:00.000Z
Link: CVE-2022-24439
No data.
Status : Modified
Published: 2022-12-06T05:15:11.420
Modified: 2025-11-03T22:15:57.110
Link: CVE-2022-24439
OpenCVE Enrichment
No data.
Debian DLA
Github GHSA
Ubuntu USN