CVE-2022-25648

The package git before 1.11.0 are vulnerable to Command Injection via git argument injection. When calling the fetch(remote = 'origin', opts = {}) function, the remote parameter is passed to the git fetch subcommand in a way that additional flags can be set. The additional flags can be used to perform a command injection.
Configurations

Configuration 1 (hide)

cpe:2.3:a:git:git:*:*:*:*:*:ruby:*:*

Configuration 2 (hide)

OR cpe:2.3:a:fedoraproject:extra_packages_for_enterprise_linux:8.0:*:*:*:*:*:*:*
cpe:2.3:o:fedoraproject:fedora:34:*:*:*:*:*:*:*
cpe:2.3:o:fedoraproject:fedora:35:*:*:*:*:*:*:*
cpe:2.3:o:fedoraproject:fedora:36:*:*:*:*:*:*:*

Configuration 3 (hide)

cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*

History

No history.

Information

Published : 2022-04-19 17:15

Updated : 2023-11-07 03:44


NVD link : CVE-2022-25648

Mitre link : CVE-2022-25648

CVE.ORG link : CVE-2022-25648


JSON object : View

Products Affected

debian

  • debian_linux

fedoraproject

  • extra_packages_for_enterprise_linux
  • fedora

git

  • git
CWE
CWE-88

Improper Neutralization of Argument Delimiters in a Command ('Argument Injection')