CVE-2022-24433 – simple-git
Package
Manager: npm
Name: simple-git
Vulnerable Version: >=0 <3.3.0
Severity
Level: High
CVSS v3.1: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H
CVSS v4.0: CVSS:4.0/AV:N/AC:H/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
EPSS: 0.00527 pctl0.66192
Details
Command injection in simple-git The package simple-git before 3.3.0 is vulnerable to Command Injection via argument injection. When calling the .fetch(remote, branch, handlerFn) function, both the remote and branch parameters are passed to the git fetch subcommand. By injecting some git options, it was possible to get arbitrary command execution.
Metadata
Created: 2022-03-12T00:00:33Z
Modified: 2022-03-17T21:46:01Z
Source: https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2022/03/GHSA-3f95-r44v-8mrg/GHSA-3f95-r44v-8mrg.json
CWE IDs: ["CWE-74", "CWE-77"]
Alternative ID: GHSA-3f95-r44v-8mrg
Finding: F422
Auto approve: 1