CVE-2022-25866 – czproject/git-php
Package
Manager: composer
Name: czproject/git-php
Vulnerable Version: >=0 <4.0.3
Severity
Level: High
CVSS v3.1: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H
CVSS v4.0: CVSS:4.0/AV:N/AC:H/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
EPSS: 0.02415 pctl0.84517
Details
Command injection in czproject/git-php The package czproject/git-php before 4.0.3 are vulnerable to Command Injection via git argument injection. When calling the isRemoteUrlReadable($url, array $refs = NULL) function, both the url and refs parameters are passed to the git ls-remote subcommand in a way that additional flags can be set. The additional flags can be used to perform a command injection.
Metadata
Created: 2022-04-26T00:00:35Z
Modified: 2022-04-27T14:35:56Z
Source: https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2022/04/GHSA-3xpw-vhmv-cw7h/GHSA-3xpw-vhmv-cw7h.json
CWE IDs: ["CWE-74", "CWE-77"]
Alternative ID: GHSA-3xpw-vhmv-cw7h
Finding: F422
Auto approve: 1