No analysis available yet.
No remediation available yet.
Tracking
Sign in to view the affected projects.
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2024-3104 | ggit is vulnerable to Arbitrary Argument Injection via the clone() API |
Github GHSA |
GHSA-pr45-cg4x-ff4m | ggit is vulnerable to Arbitrary Argument Injection via the clone() API |
Sat, 21 Mar 2026 23:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| References |
|
Tue, 08 Oct 2024 16:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Bahmutov
Bahmutov ggit |
|
| CPEs | cpe:2.3:a:bahmutov:ggit:*:*:*:*:*:*:*:* | |
| Vendors & Products |
Bahmutov
Bahmutov ggit |
|
| Metrics |
ssvc
|
Tue, 08 Oct 2024 05:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | All versions of the package ggit are vulnerable to Arbitrary Argument Injection via the clone() API, which allows specifying the remote URL to clone and the file on disk to clone to. The library does not sanitize for user input or validate a given URL scheme, nor does it properly pass command-line flags to the git binary using the double-dash POSIX characters (--) to communicate the end of options. | |
| Weaknesses | CWE-88 | |
| References |
| |
| Metrics |
cvssV3_1
|
Status: PUBLISHED
Assigner: snyk
Published:
Updated: 2026-03-21T22:21:02.144Z
Reserved: 2023-12-22T12:33:20.123Z
Link: CVE-2024-21533
Updated: 2026-03-21T22:21:02.144Z
Status : Deferred
Published: 2024-10-08T05:15:14.180
Modified: 2026-04-15T00:35:42.020
Link: CVE-2024-21533
No data.
OpenCVE Enrichment
No data.
EUVD
Github GHSA