"product_name":"git-fastclone ruby gem All versions before 1.0.5",
"version":{
"version_data":[
{
"version_value":"git-fastclone ruby gem All versions before 1.0.5"
}
]
}
}
]
},
"vendor_name":"n/a"
}
]
}
},
"data_format":"MITRE",
"data_type":"CVE",
"data_version":"4.0",
"description":{
"description_data":[
{
"lang":"eng",
"value":"git-fastclone before 1.0.5 passes user modifiable strings directly to a shell command. An attacker can execute malicious commands by modifying the strings that are passed as arguments to \"cd \" and \"git clone \" commands in the library."