CVE-2022-25912

The package simple-git before 3.15.0 are vulnerable to Remote Code Execution (RCE) when enabling the ext transport protocol, which makes it exploitable via clone() method. This vulnerability exists due to an incomplete fix of [CVE-2022-24066](https://security.snyk.io/vuln/SNYK-JS-SIMPLEGIT-2434306).
Configurations

Configuration 1 (hide)

cpe:2.3:a:simple-git_project:simple-git:*:*:*:*:*:node.js:*:*

History

21 Nov 2024, 06:53

Type Values Removed Values Added
CVSS v2 : unknown
v3 : 9.8
v2 : unknown
v3 : 8.1
References () https://github.com/steveukx/git-js/blob/main/docs/PLUGIN-UNSAFE-ACTIONS.md%23overriding-allowed-protocols - Broken Link () https://github.com/steveukx/git-js/blob/main/docs/PLUGIN-UNSAFE-ACTIONS.md%23overriding-allowed-protocols - Broken Link
References () https://github.com/steveukx/git-js/commit/774648049eb3e628379e292ea172dccaba610504 - Patch, Third Party Advisory () https://github.com/steveukx/git-js/commit/774648049eb3e628379e292ea172dccaba610504 - Patch, Third Party Advisory
References () https://github.com/steveukx/git-js/releases/tag/simple-git%403.15.0 - Release Notes, Third Party Advisory () https://github.com/steveukx/git-js/releases/tag/simple-git%403.15.0 - Release Notes, Third Party Advisory
References () https://security.snyk.io/vuln/SNYK-JAVA-ORGWEBJARSNPM-3153532 - Exploit, Patch, Third Party Advisory () https://security.snyk.io/vuln/SNYK-JAVA-ORGWEBJARSNPM-3153532 - Exploit, Patch, Third Party Advisory
References () https://security.snyk.io/vuln/SNYK-JS-SIMPLEGIT-3112221 - Exploit, Patch, Third Party Advisory () https://security.snyk.io/vuln/SNYK-JS-SIMPLEGIT-3112221 - Exploit, Patch, Third Party Advisory

08 Aug 2023, 14:21

Type Values Removed Values Added
CWE CWE-77 CWE-78

Information

Published : 2022-12-06 05:15

Updated : 2024-11-21 06:53


NVD link : CVE-2022-25912

Mitre link : CVE-2022-25912

CVE.ORG link : CVE-2022-25912


JSON object : View

Products Affected

simple-git_project

  • simple-git
CWE
CWE-78

Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')