Description
push-dir through 0.4.1 allows execution of arbritary commands. Arguments provided as part of the variable "opt.branch" is not validated before being provided to the "git" command within "index.js#L139". This could be abused by an attacker to inject arbitrary commands.
Published: 2020-02-28
Score: 9.8 Critical
EPSS: < 1% Very Low
KEV: No
Impact: n/a
Action: n/a
AI Analysis

Analysis and contextual insights are available on OpenCVE Cloud.

Remediation

No vendor fix or workaround currently provided.

Additional remediation guidance may be available on OpenCVE Cloud.

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
EUVD EUVD EUVD-2022-0929 push-dir through 0.4.1 allows execution of arbritary commands. Arguments provided as part of the variable "opt.branch" is not validated before being provided to the "git" command within "index.js#L139". This could be abused by an attacker to inject arbitrary commands.
Github GHSA Github GHSA GHSA-926x-m6m5-3mmp push-dir Enables OS Command Injection
History

No history.

Subscriptions

Push-dir Project Push-dir
cve-icon MITRE

Status: PUBLISHED

Assigner: snyk

Published:

Updated: 2024-08-04T22:32:02.167Z

Reserved: 2019-04-03T00:00:00.000Z

Link: CVE-2019-10803

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Modified

Published: 2020-02-28T21:15:13.010

Modified: 2024-11-21T04:19:57.080

Link: CVE-2019-10803

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.

Weaknesses