Metrics
Affected Vendors & Products
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2024-3104 | ggit is vulnerable to Arbitrary Argument Injection via the clone() API |
Github GHSA |
GHSA-pr45-cg4x-ff4m | ggit is vulnerable to Arbitrary Argument Injection via the clone() API |
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
Tue, 08 Oct 2024 16:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Bahmutov
Bahmutov ggit |
|
| CPEs | cpe:2.3:a:bahmutov:ggit:*:*:*:*:*:*:*:* | |
| Vendors & Products |
Bahmutov
Bahmutov ggit |
|
| Metrics |
ssvc
|
Tue, 08 Oct 2024 05:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | All versions of the package ggit are vulnerable to Arbitrary Argument Injection via the clone() API, which allows specifying the remote URL to clone and the file on disk to clone to. The library does not sanitize for user input or validate a given URL scheme, nor does it properly pass command-line flags to the git binary using the double-dash POSIX characters (--) to communicate the end of options. | |
| Weaknesses | CWE-88 | |
| References |
| |
| Metrics |
cvssV3_1
|
Projects
Sign in to view the affected projects.
Status: PUBLISHED
Assigner: snyk
Published:
Updated: 2024-10-08T15:35:10.510Z
Reserved: 2023-12-22T12:33:20.123Z
Link: CVE-2024-21533
Updated: 2024-10-08T15:35:01.286Z
Status : Awaiting Analysis
Published: 2024-10-08T05:15:14.180
Modified: 2024-10-10T12:57:21.987
Link: CVE-2024-21533
No data.
OpenCVE Enrichment
No data.
EUVD
Github GHSA