### [CVE-2022-21187](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21187) ![](https://img.shields.io/static/v1?label=Product&message=libvcs&color=blue) ![](https://img.shields.io/static/v1?label=Version&message=%3C%200.11.1%20&color=brighgreen) ![](https://img.shields.io/static/v1?label=Vulnerability&message=Command%20Injection&color=brighgreen) ### Description The package libvcs before 0.11.1 are vulnerable to Command Injection via argument injection. When calling the update_repo function (when using hg), the url parameter is passed to the hg clone command. By injecting some hg options it was possible to get arbitrary command execution. ### POC #### Reference - https://snyk.io/vuln/SNYK-PYTHON-LIBVCS-2421204 #### Github - https://github.com/dellalibera/dellalibera