Versions of the package blamer before 1.0.4 are vulnerable to Arbitrary Argument Injection via the blameByFile() API. The library does not sanitize for user input or validate the given file path conforms to a specific schema, nor does it properly pass command-line flags to the git binary using the double-dash POSIX characters (--) to communicate the end of options.
Advisories
Source ID Title
EUVD EUVD EUVD-2023-2444 blamer vulnerable to Arbitrary Argument Injection via the blameByFile() API
Github GHSA Github GHSA GHSA-6f9p-g466-f8v8 blamer vulnerable to Arbitrary Argument Injection via the blameByFile() API
Fixes

Solution

No solution given by the vendor.


Workaround

No workaround given by the vendor.

History

Wed, 25 Sep 2024 16:30:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'poc', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Projects

Sign in to view the affected projects.

cve-icon MITRE

Status: PUBLISHED

Assigner: snyk

Published:

Updated: 2024-09-25T15:25:49.067Z

Reserved: 2023-02-20T10:28:48.928Z

Link: CVE-2023-26143

cve-icon Vulnrichment

Updated: 2024-08-02T11:39:06.597Z

cve-icon NVD

Status : Modified

Published: 2023-09-19T05:17:10.443

Modified: 2024-11-21T07:50:52.047

Link: CVE-2023-26143

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.

Weaknesses