CVE-2022-1440

Command Injection vulnerability in git-interface@2.1.1 in GitHub repository yarkeev/git-interface prior to 2.1.2. If both are provided by user input, then the use of a `--upload-pack` command-line argument feature of git is also supported for `git clone`, which would then allow for any operating system command to be spawned by the attacker.
Configurations

Configuration 1 (hide)

cpe:2.3:a:git-interface_project:git-interface:*:*:*:*:*:node.js:*:*

History

21 Nov 2024, 06:40

Type Values Removed Values Added
References () https://github.com/yarkeev/git-interface/commit/f828aa790016fee3aa667f7b44cf94bf0aa8c60d - Patch, Third Party Advisory () https://github.com/yarkeev/git-interface/commit/f828aa790016fee3aa667f7b44cf94bf0aa8c60d - Patch, Third Party Advisory
References () https://huntr.dev/bounties/cdc25408-d3c1-4a9d-bb45-33b12a715ca1 - Exploit, Mitigation, Third Party Advisory () https://huntr.dev/bounties/cdc25408-d3c1-4a9d-bb45-33b12a715ca1 - Exploit, Mitigation, Third Party Advisory

Information

Published : 2022-04-22 18:15

Updated : 2024-11-21 06:40


NVD link : CVE-2022-1440

Mitre link : CVE-2022-1440

CVE.ORG link : CVE-2022-1440


JSON object : View

Products Affected

git-interface_project

  • git-interface
CWE
CWE-78

Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')