CVE-2022-25860

Versions of the package simple-git before 3.16.0 are vulnerable to Remote Code Execution (RCE) via the clone(), pull(), push() and listRemote() methods, due to improper input sanitization. This vulnerability exists due to an incomplete fix of [CVE-2022-25912](https://security.snyk.io/vuln/SNYK-JS-SIMPLEGIT-3112221).
Configurations

Configuration 1 (hide)

cpe:2.3:a:simple-git_project:simple-git:*:*:*:*:*:node.js:*:*

History

07 Nov 2023, 03:44

Type Values Removed Values Added
Summary Versions of the package simple-git before 3.16.0 are vulnerable to Remote Code Execution (RCE) via the clone(), pull(), push() and listRemote() methods, due to improper input sanitization. This vulnerability exists due to an incomplete fix of [CVE-2022-25912](https://security.snyk.io/vuln/SNYK-JS-SIMPLEGIT-3112221). Versions of the package simple-git before 3.16.0 are vulnerable to Remote Code Execution (RCE) via the clone(), pull(), push() and listRemote() methods, due to improper input sanitization. This vulnerability exists due to an incomplete fix of [CVE-2022-25912](https://security.snyk.io/vuln/SNYK-JS-SIMPLEGIT-3112221).

Information

Published : 2023-01-26 21:15

Updated : 2024-02-28 19:51


NVD link : CVE-2022-25860

Mitre link : CVE-2022-25860

CVE.ORG link : CVE-2022-25860


JSON object : View

Products Affected

simple-git_project

  • simple-git
CWE
NVD-CWE-noinfo CWE-94

Improper Control of Generation of Code ('Code Injection')