Description
The package ungit before 1.5.20 are vulnerable to Remote Code Execution (RCE) via argument injection. The issue occurs when calling the /api/fetch endpoint. User controlled values (remote and ref) are passed to the git fetch command. By injecting some git options it was possible to get arbitrary command execution.
No analysis available yet.
Remediation
No remediation available yet.
Tracking
Sign in to view the affected projects.
Advisories
| Source | ID | Title |
|---|---|---|
Github GHSA |
GHSA-hf8c-xr89-vfm5 | Command Injection in ungit |
References
History
No history.
Status: PUBLISHED
Assigner: snyk
Published:
Updated: 2024-09-16T22:41:07.983Z
Reserved: 2022-02-24T00:00:00.000Z
Link: CVE-2022-25766
No data.
Status : Modified
Published: 2022-03-21T18:15:07.990
Modified: 2024-11-21T06:52:57.857
Link: CVE-2022-25766
No data.
OpenCVE Enrichment
No data.
Weaknesses
Github GHSA