CVE-2022-25866

The package czproject/git-php before 4.0.3 are vulnerable to Command Injection via git argument injection. When calling the isRemoteUrlReadable($url, array $refs = NULL) function, both the url and refs parameters are passed to the git ls-remote subcommand in a way that additional flags can be set. The additional flags can be used to perform a command injection.
Configurations

Configuration 1 (hide)

cpe:2.3:a:git-php_project:git-php:*:*:*:*:*:*:*:*

History

21 Nov 2024, 06:53

Type Values Removed Values Added
References () https://github.com/czproject/git-php/commit/5e82d5479da5f16d37a915de4ec55e1ac78de733 - Patch, Third Party Advisory () https://github.com/czproject/git-php/commit/5e82d5479da5f16d37a915de4ec55e1ac78de733 - Patch, Third Party Advisory
References () https://github.com/czproject/git-php/releases/tag/v4.0.3 - Release Notes, Third Party Advisory () https://github.com/czproject/git-php/releases/tag/v4.0.3 - Release Notes, Third Party Advisory
References () https://snyk.io/vuln/SNYK-PHP-CZPROJECTGITPHP-2421349 - Exploit, Patch, Third Party Advisory () https://snyk.io/vuln/SNYK-PHP-CZPROJECTGITPHP-2421349 - Exploit, Patch, Third Party Advisory
CVSS v2 : 7.5
v3 : 9.8
v2 : 7.5
v3 : 8.1

08 Aug 2023, 14:21

Type Values Removed Values Added
CWE CWE-77 CWE-88

Information

Published : 2022-04-25 17:15

Updated : 2024-11-21 06:53


NVD link : CVE-2022-25866

Mitre link : CVE-2022-25866

CVE.ORG link : CVE-2022-25866


JSON object : View

Products Affected

git-php_project

  • git-php
CWE
CWE-88

Improper Neutralization of Argument Delimiters in a Command ('Argument Injection')