Command Injection vulnerability in git-interface@2.1.1 in GitHub repository yarkeev/git-interface prior to 2.1.2. If both are provided by user input, then the use of a `--upload-pack` command-line argument feature of git is also supported for `git clone`, which would then allow for any operating system command to be spawned by the attacker.
References
Link | Resource |
---|---|
https://github.com/yarkeev/git-interface/commit/f828aa790016fee3aa667f7b44cf94bf0aa8c60d | Patch Third Party Advisory |
https://huntr.dev/bounties/cdc25408-d3c1-4a9d-bb45-33b12a715ca1 | Exploit Mitigation Third Party Advisory |
https://github.com/yarkeev/git-interface/commit/f828aa790016fee3aa667f7b44cf94bf0aa8c60d | Patch Third Party Advisory |
https://huntr.dev/bounties/cdc25408-d3c1-4a9d-bb45-33b12a715ca1 | Exploit Mitigation Third Party Advisory |
Configurations
History
21 Nov 2024, 06:40
Type | Values Removed | Values Added |
---|---|---|
References | () https://github.com/yarkeev/git-interface/commit/f828aa790016fee3aa667f7b44cf94bf0aa8c60d - Patch, Third Party Advisory | |
References | () https://huntr.dev/bounties/cdc25408-d3c1-4a9d-bb45-33b12a715ca1 - Exploit, Mitigation, Third Party Advisory |
Information
Published : 2022-04-22 18:15
Updated : 2024-11-21 06:40
NVD link : CVE-2022-1440
Mitre link : CVE-2022-1440
CVE.ORG link : CVE-2022-1440
JSON object : View
Products Affected
git-interface_project
- git-interface
CWE
CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')