logo

CVE-2022-24439 gitpython

Package

Manager: pip
Name: gitpython
Vulnerable Version: >=0 <3.1.30

Severity

Level: Critical

CVSS v3.1: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H

CVSS v4.0: CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N

EPSS: 0.69549 pctl0.98603

Details

GitPython vulnerable to Remote Code Execution due to improper user input validation All versions of package gitpython are vulnerable to Remote Code Execution (RCE) due to improper user input validation, which makes it possible to inject a maliciously crafted remote URL into the clone command. Exploiting this vulnerability is possible because the library makes external calls to git without sufficient sanitization of input arguments.

Metadata

Created: 2022-12-06T06:30:17Z
Modified: 2024-11-18T16:26:28Z
Source: https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2022/12/GHSA-hcpj-qp55-gfph/GHSA-hcpj-qp55-gfph.json
CWE IDs: ["CWE-20", "CWE-94"]
Alternative ID: GHSA-hcpj-qp55-gfph
Finding: F184
Auto approve: 1