cve/2022/CVE-2022-21187.md

18 lines
792 B
Markdown
Raw Normal View History

2024-05-25 21:48:12 +02:00
### [CVE-2022-21187](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21187)
![](https://img.shields.io/static/v1?label=Product&message=libvcs&color=blue)
![](https://img.shields.io/static/v1?label=Version&message=%3C%200.11.1%20&color=brighgreen)
![](https://img.shields.io/static/v1?label=Vulnerability&message=Command%20Injection&color=brighgreen)
### Description
The package libvcs before 0.11.1 are vulnerable to Command Injection via argument injection. When calling the update_repo function (when using hg), the url parameter is passed to the hg clone command. By injecting some hg options it was possible to get arbitrary command execution.
### POC
#### Reference
- https://snyk.io/vuln/SNYK-PYTHON-LIBVCS-2421204
#### Github
- https://github.com/dellalibera/dellalibera