logo

CVE-2022-1440 git-interface

Package

Manager: npm
Name: git-interface
Vulnerable Version: >=0 <2.1.2

Severity

Level: Critical

CVSS v3.1: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

CVSS v4.0: CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:H/SI:H/SA:H

EPSS: 0.11162 pctl0.93224

Details

Command injection in git-interface A command injection vulnerability exists in git-interface in the GitHub repository yarkeev/git-interface prior to 2.1.2. If both the git remote and destination directory are provided by user input, then the use of an `--upload-pack` command-line argument feature of git is also supported for `git clone`, which would then allow for any operating system command to be spawned by the attacker.

Metadata

Created: 2022-04-23T00:03:01Z
Modified: 2022-04-29T17:22:43Z
Source: https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2022/04/GHSA-qffw-8wg7-h665/GHSA-qffw-8wg7-h665.json
CWE IDs: ["CWE-78", "CWE-88"]
Alternative ID: GHSA-qffw-8wg7-h665
Finding: F404
Auto approve: 1