All versions of the package ggit are vulnerable to Arbitrary Argument Injection via the clone() API, which allows specifying the remote URL to clone and the file on disk to clone to. The library does not sanitize for user input or validate a given URL scheme, nor does it properly pass command-line flags to the git binary using the double-dash POSIX characters (--) to communicate the end of options.
History

Tue, 08 Oct 2024 16:15:00 +0000

Type Values Removed Values Added
First Time appeared Bahmutov
Bahmutov ggit
CPEs cpe:2.3:a:bahmutov:ggit:*:*:*:*:*:*:*:*
Vendors & Products Bahmutov
Bahmutov ggit
Metrics ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'poc', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Tue, 08 Oct 2024 05:15:00 +0000

Type Values Removed Values Added
Description All versions of the package ggit are vulnerable to Arbitrary Argument Injection via the clone() API, which allows specifying the remote URL to clone and the file on disk to clone to. The library does not sanitize for user input or validate a given URL scheme, nor does it properly pass command-line flags to the git binary using the double-dash POSIX characters (--) to communicate the end of options.
Weaknesses CWE-88
References
Metrics cvssV3_1

{'score': 6.5, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L/E:P'}


cve-icon MITRE

Status: PUBLISHED

Assigner: snyk

Published: 2024-10-08T05:00:05.285Z

Updated: 2024-10-08T15:35:10.510Z

Reserved: 2023-12-22T12:33:20.123Z

Link: CVE-2024-21533

cve-icon Vulnrichment

Updated: 2024-10-08T15:35:01.286Z

cve-icon NVD

Status : Received

Published: 2024-10-08T05:15:14.180

Modified: 2024-10-08T16:35:04.437

Link: CVE-2024-21533

cve-icon Redhat

No data.