ruby-git versions prior to v1.13.0 allows a remote authenticated attacker to execute an arbitrary ruby code by having a user to load a repository containing a specially crafted filename to the product. This vulnerability is different from CVE-2022-46648.
References
Link | Resource |
---|---|
https://github.com/ruby-git/ruby-git | Product Third Party Advisory |
https://github.com/ruby-git/ruby-git/pull/602 | Patch Third Party Advisory |
https://jvn.jp/en/jp/JVN16765254/index.html | Third Party Advisory |
https://lists.debian.org/debian-lts-announce/2023/01/msg00043.html | Mailing List Third Party Advisory |
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/4KPFLSZPUM7APWVBRM5DCAY5OUVQBF4K/ |
Configurations
History
No history.
Information
Published : 2023-01-17 10:15
Updated : 2023-11-07 03:56
NVD link : CVE-2022-47318
Mitre link : CVE-2022-47318
CVE.ORG link : CVE-2022-47318
JSON object : View
Products Affected
debian
- debian_linux
fedoraproject
- fedora
ruby-git_project
- ruby-git
CWE