Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
| Source | ID | Title |
|---|---|---|
Debian DLA |
DLA-3277-1 | powerline-gitstatus security update |
EUVD |
EUVD-2022-7172 | powerline-gitstatus (aka Powerline Gitstatus) before 1.3.2 allows arbitrary code execution. git repositories can contain per-repository configuration that changes the behavior of git, including running arbitrary commands. When using powerline-gitstatus, changing to a directory automatically runs git commands in order to display information about the current repository in the prompt. If an attacker can convince a user to change their current directory to one controlled by the attacker, such as in a shared filesystem or extracted archive, powerline-gitstatus will run arbitrary commands under the attacker's control. NOTE: this is similar to CVE-2022-20001. |
Github GHSA |
GHSA-w67g-6gjv-c599 | Powerline Gitstatus vulnerable to arbitrary code execution |
Thu, 15 May 2025 17:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Status: PUBLISHED
Assigner: mitre
Published:
Updated: 2025-05-15T16:14:22.051Z
Reserved: 2022-10-13T00:00:00.000Z
Link: CVE-2022-42906
Updated: 2024-08-03T13:19:05.219Z
Status : Modified
Published: 2022-10-13T03:15:09.130
Modified: 2025-05-15T17:15:47.580
Link: CVE-2022-42906
No data.
OpenCVE Enrichment
No data.
Debian DLA
EUVD
Github GHSA