cve/2022/CVE-2022-25648.md

19 lines
867 B
Markdown
Raw Normal View History

2024-05-25 21:48:12 +02:00
### [CVE-2022-25648](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-25648)
![](https://img.shields.io/static/v1?label=Product&message=git&color=blue)
![](https://img.shields.io/static/v1?label=Version&message=%3C%201.11.0%20&color=brighgreen)
![](https://img.shields.io/static/v1?label=Vulnerability&message=Command%20Injection&color=brighgreen)
### Description
The package git before 1.11.0 are vulnerable to Command Injection via git argument injection. When calling the fetch(remote = 'origin', opts = {}) function, the remote parameter is passed to the git fetch subcommand in a way that additional flags can be set. The additional flags can be used to perform a command injection.
### POC
#### Reference
- https://snyk.io/vuln/SNYK-RUBY-GIT-2421270
#### Github
- https://github.com/ARPSyndicate/cvemon
- https://github.com/dellalibera/dellalibera