Impact
PrefectHQ prefect releases a vulnerability affecting versions up to 3.6.25.dev6, where manipulation of the commit_sha and directories arguments in the GitRepository Pull handler can lead to argument injection. The injection can be triggered remotely and an exploit is publicly available, allowing an attacker to execute arbitrary commands on the system. The vendor has released a patch as part of version 3.6.25.dev7 to mitigate this issue.
Affected Systems
PrefectHQ prefect product versions up to and including 3.6.25.dev6 are susceptible. The issue is fixed in version 3.6.25.dev7 and later releases. The vulnerability specifically targets the GitRepository Pull feature in the Prefect runner storage module.
Risk and Exploitability
The CVSS score of 5.3 denotes moderate severity. The EPSS score is below 1%, indicating a low probability of exploitation in the current environment, and the vulnerability is not listed in CISA's KEV catalog. Based on the description, the attack vector appears to be remote through the Git repository pull operation, enabling an attacker to trigger argument injection and potentially execute arbitrary code.
OpenCVE Enrichment