The package simple-git before 3.15.0 are vulnerable to Remote Code Execution (RCE) when enabling the ext transport protocol, which makes it exploitable via clone() method. This vulnerability exists due to an incomplete fix of [CVE-2022-24066](https://security.snyk.io/vuln/SNYK-JS-SIMPLEGIT-2434306).
References
Configurations
History
21 Nov 2024, 06:53
Type | Values Removed | Values Added |
---|---|---|
CVSS |
v2 : v3 : |
v2 : unknown
v3 : 8.1 |
References | () https://github.com/steveukx/git-js/blob/main/docs/PLUGIN-UNSAFE-ACTIONS.md%23overriding-allowed-protocols - Broken Link | |
References | () https://github.com/steveukx/git-js/commit/774648049eb3e628379e292ea172dccaba610504 - Patch, Third Party Advisory | |
References | () https://github.com/steveukx/git-js/releases/tag/simple-git%403.15.0 - Release Notes, Third Party Advisory | |
References | () https://security.snyk.io/vuln/SNYK-JAVA-ORGWEBJARSNPM-3153532 - Exploit, Patch, Third Party Advisory | |
References | () https://security.snyk.io/vuln/SNYK-JS-SIMPLEGIT-3112221 - Exploit, Patch, Third Party Advisory |
08 Aug 2023, 14:21
Type | Values Removed | Values Added |
---|---|---|
CWE | CWE-78 |
Information
Published : 2022-12-06 05:15
Updated : 2024-11-21 06:53
NVD link : CVE-2022-25912
Mitre link : CVE-2022-25912
CVE.ORG link : CVE-2022-25912
JSON object : View
Products Affected
simple-git_project
- simple-git
CWE
CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')