The package ungit before 1.5.20 are vulnerable to Remote Code Execution (RCE) via argument injection. The issue occurs when calling the /api/fetch endpoint. User controlled values (remote and ref) are passed to the git fetch command. By injecting some git options it was possible to get arbitrary command execution.
Metrics
Affected Vendors & Products
Advisories
| Source | ID | Title |
|---|---|---|
Github GHSA |
GHSA-hf8c-xr89-vfm5 | Command Injection in ungit |
Fixes
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
References
History
No history.
Status: PUBLISHED
Assigner: snyk
Published:
Updated: 2024-09-16T22:41:07.983Z
Reserved: 2022-02-24T00:00:00
Link: CVE-2022-25766
No data.
Status : Modified
Published: 2022-03-21T18:15:07.990
Modified: 2024-11-21T06:52:57.857
Link: CVE-2022-25766
No data.
OpenCVE Enrichment
No data.
Github GHSA