The package git before 1.11.0 are vulnerable to Command Injection via git argument injection. When calling the fetch(remote = 'origin', opts = {}) function, the remote parameter is passed to the git fetch subcommand in a way that additional flags can be set. The additional flags can be used to perform a command injection.
Metrics
Affected Vendors & Products
Advisories
Source | ID | Title |
---|---|---|
![]() |
DLA-3303-1 | ruby-git security update |
![]() |
EUVD-2022-1646 | The package git before 1.11.0 are vulnerable to Command Injection via git argument injection. When calling the fetch(remote = 'origin', opts = {}) function, the remote parameter is passed to the git fetch subcommand in a way that additional flags can be set. The additional flags can be used to perform a command injection. |
![]() |
GHSA-69p6-wvmq-27gg | Command injection in ruby-git |
Fixes
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
References
History
No history.

Status: PUBLISHED
Assigner: snyk
Published:
Updated: 2024-09-16T17:59:47.353Z
Reserved: 2022-02-24T00:00:00
Link: CVE-2022-25648

No data.

Status : Modified
Published: 2022-04-19T17:15:11.333
Modified: 2024-11-21T06:52:30.400
Link: CVE-2022-25648


No data.