cve/2022/CVE-2022-25860.md

19 lines
891 B
Markdown
Raw Normal View History

2024-05-25 21:48:12 +02:00
### [CVE-2022-25860](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-25860)
![](https://img.shields.io/static/v1?label=Product&message=simple-git&color=blue)
![](https://img.shields.io/static/v1?label=Version&message=%3D%200%20&color=brighgreen)
![](https://img.shields.io/static/v1?label=Vulnerability&message=Remote%20Code%20Execution%20(RCE)&color=brighgreen)
### Description
Versions of the package simple-git before 3.16.0 are vulnerable to Remote Code Execution (RCE) via the clone(), pull(), push() and listRemote() methods, due to improper input sanitization. This vulnerability exists due to an incomplete fix of [CVE-2022-25912](https://security.snyk.io/vuln/SNYK-JS-SIMPLEGIT-3112221).
### POC
#### Reference
- https://security.snyk.io/vuln/SNYK-JS-SIMPLEGIT-3177391
#### Github
- https://github.com/ARPSyndicate/cvemon
- https://github.com/grafana/plugin-validator