### [CVE-2019-10803](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-10803) ![](https://img.shields.io/static/v1?label=Product&message=push-dir&color=blue) ![](https://img.shields.io/static/v1?label=Version&message=n%2Fa&color=blue) ![](https://img.shields.io/static/v1?label=Vulnerability&message=Command%20Injection&color=brighgreen) ### Description push-dir through 0.4.1 allows execution of arbritary commands. Arguments provided as part of the variable "opt.branch" is not validated before being provided to the "git" command within "index.js#L139". This could be abused by an attacker to inject arbitrary commands. ### POC #### Reference - https://snyk.io/vuln/SNYK-JS-PUSHDIR-559009 - https://snyk.io/vuln/SNYK-JS-PUSHDIR-559009 #### Github No PoCs found on GitHub currently.