CVE-2022-25766 – ungit
Package
Manager: npm
Name: ungit
Vulnerable Version: >=0 <1.5.20
Severity
Level: High
CVSS v3.1: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
CVSS v4.0: CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
EPSS: 0.07704 pctl0.91527
Details
Command Injection in ungit The package ungit before 1.5.20 are vulnerable to Remote Code Execution (RCE) via argument injection. The issue occurs when calling the /api/fetch endpoint. User controlled values (remote and ref) are passed to the git fetch command. By injecting some git options it was possible to get arbitrary command execution.
Metadata
Created: 2022-03-22T00:00:41Z
Modified: 2022-03-28T18:26:27Z
Source: https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2022/03/GHSA-hf8c-xr89-vfm5/GHSA-hf8c-xr89-vfm5.json
CWE IDs: ["CWE-77"]
Alternative ID: GHSA-hf8c-xr89-vfm5
Finding: F422
Auto approve: 1