CVE-2021-34081

OS Command Injection vulnerability in bbultman gitsome through 0.2.3 allows attackers to execute arbitrary commands via a crafted tag name of the target git repository.
References
Link Resource
https://advisory.checkmarx.net/advisory/CX-2021-4780 Exploit Third Party Advisory
https://www.npmjs.com/package/gitsome Product Third Party Advisory
https://advisory.checkmarx.net/advisory/CX-2021-4780 Exploit Third Party Advisory
https://www.npmjs.com/package/gitsome Product Third Party Advisory
Configurations

Configuration 1 (hide)

cpe:2.3:a:gitsome_project:gitsome:*:*:*:*:*:node.js:*:*

History

21 Nov 2024, 06:09

Type Values Removed Values Added
References () https://advisory.checkmarx.net/advisory/CX-2021-4780 - Exploit, Third Party Advisory () https://advisory.checkmarx.net/advisory/CX-2021-4780 - Exploit, Third Party Advisory
References () https://www.npmjs.com/package/gitsome - Product, Third Party Advisory () https://www.npmjs.com/package/gitsome - Product, Third Party Advisory

Information

Published : 2022-06-02 14:15

Updated : 2024-11-21 06:09


NVD link : CVE-2021-34081

Mitre link : CVE-2021-34081

CVE.ORG link : CVE-2021-34081


JSON object : View

Products Affected

gitsome_project

  • gitsome
CWE
CWE-78

Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')