CVE-2022-46648

ruby-git versions prior to v1.13.0 allows a remote authenticated attacker to execute an arbitrary ruby code by having a user to load a repository containing a specially crafted filename to the product. This vulnerability is different from CVE-2022-47318.
References
Configurations

Configuration 1 (hide)

cpe:2.3:a:ruby-git_project:ruby-git:*:*:*:*:*:*:*:*

Configuration 2 (hide)

cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*

History

21 Nov 2024, 07:30

Type Values Removed Values Added
Summary
  • (es) Las versiones de ruby-git anteriores a la v1.13.0 permiten a un atacante remoto autenticado ejecutar un código Ruby arbitrario haciendo que un usuario cargue en el producto un repositorio que contiene un nombre de archivo especialmente manipulado. Esta vulnerabilidad es diferente de CVE-2022-47318.
References () https://github.com/ruby-git/ruby-git - Product, Third Party Advisory () https://github.com/ruby-git/ruby-git - Product, Third Party Advisory
References () https://github.com/ruby-git/ruby-git/pull/602 - Patch, Third Party Advisory () https://github.com/ruby-git/ruby-git/pull/602 - Patch, Third Party Advisory
References () https://jvn.jp/en/jp/JVN16765254/index.html - Third Party Advisory () https://jvn.jp/en/jp/JVN16765254/index.html - Third Party Advisory
References () https://lists.debian.org/debian-lts-announce/2023/01/msg00043.html - Mailing List, Third Party Advisory () https://lists.debian.org/debian-lts-announce/2023/01/msg00043.html - Mailing List, Third Party Advisory

Information

Published : 2023-01-17 10:15

Updated : 2024-11-21 07:30


NVD link : CVE-2022-46648

Mitre link : CVE-2022-46648

CVE.ORG link : CVE-2022-46648


JSON object : View

Products Affected

debian

  • debian_linux

ruby-git_project

  • ruby-git
CWE
CWE-94

Improper Control of Generation of Code ('Code Injection')