The package simple-git before 3.3.0 are vulnerable to Command Injection via argument injection. When calling the .fetch(remote, branch, handlerFn) function, both the remote and branch parameters are passed to the git fetch subcommand. By injecting some git options it was possible to get arbitrary command execution.
References
Link | Resource |
---|---|
https://github.com/steveukx/git-js/pull/767 | Patch Third Party Advisory |
https://github.com/steveukx/git-js/releases/tag/simple-git%403.3.0 | Patch Third Party Advisory |
https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSNPM-2421245 | Patch Third Party Advisory |
https://snyk.io/vuln/SNYK-JS-SIMPLEGIT-2421199 | Patch Third Party Advisory |
Configurations
History
No history.
Information
Published : 2022-03-11 17:16
Updated : 2023-08-08 14:21
NVD link : CVE-2022-24433
Mitre link : CVE-2022-24433
CVE.ORG link : CVE-2022-24433
JSON object : View
Products Affected
simple-git_project
- simple-git
CWE
CWE-88
Improper Neutralization of Argument Delimiters in a Command ('Argument Injection')