CVE-2024-21532

All versions of the package ggit are vulnerable to Command Injection via the fetchTags(branch) API, which allows user input to specify the branch to be fetched and then concatenates this string along with a git command which is then passed to the unsafe exec() Node.js child process API.
Configurations

No configuration.

History

10 Oct 2024, 12:57

Type Values Removed Values Added
Summary
  • (es) Todas las versiones del paquete ggit son vulnerables a la inyección de comandos a través de la API fetchTags(branch), que permite la entrada del usuario para especificar la rama que se buscará y luego concatena esta cadena junto con un comando git que luego se pasa a la API del proceso secundario exec() de Node.js inseguro.

08 Oct 2024, 05:15

Type Values Removed Values Added
New CVE

Information

Published : 2024-10-08 05:15

Updated : 2024-10-10 12:57


NVD link : CVE-2024-21532

Mitre link : CVE-2024-21532

CVE.ORG link : CVE-2024-21532


JSON object : View

Products Affected

No product.

CWE
CWE-78

Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')