Description
Versions of the package blamer before 1.0.4 are vulnerable to Arbitrary Argument Injection via the blameByFile() API. The library does not sanitize for user input or validate the given file path conforms to a specific schema, nor does it properly pass command-line flags to the git binary using the double-dash POSIX characters (--) to communicate the end of options.
Published: 2023-09-19
Score: 6.5 Medium
EPSS: < 1% Very Low
KEV: No
Impact: n/a
Action: n/a
AI Analysis

No analysis available yet.

Remediation

No remediation available yet.

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
EUVD EUVD EUVD-2023-2444 blamer vulnerable to Arbitrary Argument Injection via the blameByFile() API
Github GHSA Github GHSA GHSA-6f9p-g466-f8v8 blamer vulnerable to Arbitrary Argument Injection via the blameByFile() API
History

Wed, 25 Sep 2024 16:30:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'poc', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Subscriptions

Blamer Project Blamer
cve-icon MITRE

Status: PUBLISHED

Assigner: snyk

Published:

Updated: 2024-09-25T15:25:49.067Z

Reserved: 2023-02-20T10:28:48.928Z

Link: CVE-2023-26143

cve-icon Vulnrichment

Updated: 2024-08-02T11:39:06.597Z

cve-icon NVD

Status : Modified

Published: 2023-09-19T05:17:10.443

Modified: 2024-11-21T07:50:52.047

Link: CVE-2023-26143

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.

Weaknesses