Sourcegraph is a code intelligence platform. In versions prior to 4.1.0 a command Injection vulnerability existed in the gitserver service, present in all Sourcegraph deployments. This vulnerability was caused by a lack of input validation on the host parameter of the `/list-gitolite` endpoint. It was possible to send a crafted request to gitserver that would execute commands inside the container. Successful exploitation requires the ability to send local requests to gitserver. The issue is patched in version 4.1.0.
References
Link | Resource |
---|---|
https://github.com/sourcegraph/sourcegraph/pull/42553 | Patch Third Party Advisory |
https://github.com/sourcegraph/sourcegraph/security/advisories/GHSA-pfm3-23mh-6xjp | Third Party Advisory |
https://github.com/sourcegraph/sourcegraph/pull/42553 | Patch Third Party Advisory |
https://github.com/sourcegraph/sourcegraph/security/advisories/GHSA-pfm3-23mh-6xjp | Third Party Advisory |
Configurations
History
21 Nov 2024, 07:24
Type | Values Removed | Values Added |
---|---|---|
References | () https://github.com/sourcegraph/sourcegraph/pull/42553 - Patch, Third Party Advisory | |
References | () https://github.com/sourcegraph/sourcegraph/security/advisories/GHSA-pfm3-23mh-6xjp - Third Party Advisory | |
CVSS |
v2 : v3 : |
v2 : unknown
v3 : 7.9 |
Information
Published : 2022-11-22 19:15
Updated : 2024-11-21 07:24
NVD link : CVE-2022-41942
Mitre link : CVE-2022-41942
CVE.ORG link : CVE-2022-41942
JSON object : View
Products Affected
sourcegraph
- sourcegraph