The package git before 1.11.0 are vulnerable to Command Injection via git argument injection. When calling the fetch(remote = 'origin', opts = {}) function, the remote parameter is passed to the git fetch subcommand in a way that additional flags can be set. The additional flags can be used to perform a command injection.
Metrics
Affected Vendors & Products
Advisories
| Source | ID | Title |
|---|---|---|
Debian DLA |
DLA-3303-1 | ruby-git security update |
EUVD |
EUVD-2022-1646 | The package git before 1.11.0 are vulnerable to Command Injection via git argument injection. When calling the fetch(remote = 'origin', opts = {}) function, the remote parameter is passed to the git fetch subcommand in a way that additional flags can be set. The additional flags can be used to perform a command injection. |
Github GHSA |
GHSA-69p6-wvmq-27gg | Command injection in ruby-git |
Fixes
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
References
History
No history.
Status: PUBLISHED
Assigner: snyk
Published:
Updated: 2024-09-16T17:59:47.353Z
Reserved: 2022-02-24T00:00:00
Link: CVE-2022-25648
No data.
Status : Modified
Published: 2022-04-19T17:15:11.333
Modified: 2024-11-21T06:52:30.400
Link: CVE-2022-25648
OpenCVE Enrichment
No data.
Debian DLA
EUVD
Github GHSA