cve/2022/CVE-2022-25860.md

20 lines
950 B
Markdown
Raw Normal View History

2024-05-25 21:48:12 +02:00
### [CVE-2022-25860](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-25860)
![](https://img.shields.io/static/v1?label=Product&message=simple-git&color=blue)
![](https://img.shields.io/static/v1?label=Version&message=%3D%200%20&color=brighgreen)
![](https://img.shields.io/static/v1?label=Vulnerability&message=Remote%20Code%20Execution%20(RCE)&color=brighgreen)
### Description
Versions of the package simple-git before 3.16.0 are vulnerable to Remote Code Execution (RCE) via the clone(), pull(), push() and listRemote() methods, due to improper input sanitization. This vulnerability exists due to an incomplete fix of [CVE-2022-25912](https://security.snyk.io/vuln/SNYK-JS-SIMPLEGIT-3112221).
### POC
#### Reference
- https://security.snyk.io/vuln/SNYK-JS-SIMPLEGIT-3177391
2024-06-09 00:33:16 +00:00
- https://security.snyk.io/vuln/SNYK-JS-SIMPLEGIT-3177391
2024-05-25 21:48:12 +02:00
#### Github
- https://github.com/ARPSyndicate/cvemon
- https://github.com/grafana/plugin-validator