ruby-git versions prior to v1.13.0 allows a remote authenticated attacker to execute an arbitrary ruby code by having a user to load a repository containing a specially crafted filename to the product. This vulnerability is different from CVE-2022-47318.
References
Link | Resource |
---|---|
https://github.com/ruby-git/ruby-git | Product Third Party Advisory |
https://github.com/ruby-git/ruby-git/pull/602 | Patch Third Party Advisory |
https://jvn.jp/en/jp/JVN16765254/index.html | Third Party Advisory |
https://lists.debian.org/debian-lts-announce/2023/01/msg00043.html | Mailing List Third Party Advisory |
https://github.com/ruby-git/ruby-git | Product Third Party Advisory |
https://github.com/ruby-git/ruby-git/pull/602 | Patch Third Party Advisory |
https://jvn.jp/en/jp/JVN16765254/index.html | Third Party Advisory |
https://lists.debian.org/debian-lts-announce/2023/01/msg00043.html | Mailing List Third Party Advisory |
Configurations
History
21 Nov 2024, 07:30
Type | Values Removed | Values Added |
---|---|---|
Summary |
|
|
References | () https://github.com/ruby-git/ruby-git - Product, Third Party Advisory | |
References | () https://github.com/ruby-git/ruby-git/pull/602 - Patch, Third Party Advisory | |
References | () https://jvn.jp/en/jp/JVN16765254/index.html - Third Party Advisory | |
References | () https://lists.debian.org/debian-lts-announce/2023/01/msg00043.html - Mailing List, Third Party Advisory |
Information
Published : 2023-01-17 10:15
Updated : 2024-11-21 07:30
NVD link : CVE-2022-46648
Mitre link : CVE-2022-46648
CVE.ORG link : CVE-2022-46648
JSON object : View
Products Affected
debian
- debian_linux
ruby-git_project
- ruby-git
CWE
CWE-94
Improper Control of Generation of Code ('Code Injection')