Description
The package ungit before 1.5.20 are vulnerable to Remote Code Execution (RCE) via argument injection. The issue occurs when calling the /api/fetch endpoint. User controlled values (remote and ref) are passed to the git fetch command. By injecting some git options it was possible to get arbitrary command execution.
Analysis and contextual insights are available on OpenCVE Cloud.
Remediation
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
Advisories
| Source | ID | Title |
|---|---|---|
Github GHSA |
GHSA-hf8c-xr89-vfm5 | Command Injection in ungit |
References
History
No history.
Status: PUBLISHED
Assigner: snyk
Published:
Updated: 2024-09-16T22:41:07.983Z
Reserved: 2022-02-24T00:00:00.000Z
Link: CVE-2022-25766
No data.
Status : Modified
Published: 2022-03-21T18:15:07.990
Modified: 2024-11-21T06:52:57.857
Link: CVE-2022-25766
No data.
OpenCVE Enrichment
No data.
Weaknesses
Github GHSA