Versions of the package simple-git before 3.16.0 are vulnerable to Remote Code Execution (RCE) via the clone(), pull(), push() and listRemote() methods, due to improper input sanitization.
This vulnerability exists due to an incomplete fix of [CVE-2022-25912](https://security.snyk.io/vuln/SNYK-JS-SIMPLEGIT-3112221).
References
Link | Resource |
---|---|
https://github.com/steveukx/git-js/commit/ec97a39ab60b89e870c5170121cd9c1603cc1951 | Patch Third Party Advisory |
https://github.com/steveukx/git-js/pull/881/commits/95459310e5b8f96e20bb77ef1a6559036b779e13 | Patch Third Party Advisory |
https://security.snyk.io/vuln/SNYK-JS-SIMPLEGIT-3177391 | Exploit Third Party Advisory |
Configurations
History
No history.
Information
Published : 2023-01-26 21:15
Updated : 2023-11-07 03:44
NVD link : CVE-2022-25860
Mitre link : CVE-2022-25860
CVE.ORG link : CVE-2022-25860
JSON object : View
Products Affected
simple-git_project
- simple-git
CWE