CVE-2015-8969 – git-fastclone
Package
Manager: gem
Name: git-fastclone
Vulnerable Version: >=0 <1.0.5
Severity
Level: Critical
CVSS v3.1: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
CVSS v4.0: CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
EPSS: 0.02489 pctl0.84732
Details
Git-fastclone passes user modifiable strings directly to a shell command git-fastclone before 1.0.5 passes user modifiable strings directly to a shell command. An attacker can execute malicious commands by modifying the strings that are passed as arguments to `cd ` and `git clone ` commands in the library.
Metadata
Created: 2018-08-15T20:04:44Z
Modified: 2023-01-26T21:13:16Z
Source: https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2018/08/GHSA-mf6w-45cf-qhmp/GHSA-mf6w-45cf-qhmp.json
CWE IDs: ["CWE-77"]
Alternative ID: GHSA-mf6w-45cf-qhmp
Finding: F422
Auto approve: 1