logo

CVE-2022-23915 weblate

Package

Manager: pip
Name: weblate
Vulnerable Version: >=0 <4.11.1

Severity

Level: High

CVSS v3.1: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

CVSS v4.0: CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:L/SI:L/SA:N

EPSS: 0.01633 pctl0.81192

Details

Improper Neutralization of Special Elements used in a Command ('Command Injection') in Weblate ### Impact Weblate didn't correctly sanitize some arguments passed to Git and Mercurial, which allowed changing their behavior in an unintended way. ### Patches The issues were fixed in the 4.11.1 release. The following commits are addressing it: * 35d59f1f040541c358cece0a8d4a63183ca919b8 * d83672a3e7415da1490334e2c9431e5da1966842 ### Workarounds Instances in which untrusted users cannot create new components are not affected. ### References * [SNYK-PYTHON-WEBLATE-2414088](https://security.snyk.io/vuln/SNYK-PYTHON-WEBLATE-2414088) ### For more information If you have any questions or comments about this advisory: * Open a topic in [discussions](https://github.com/WeblateOrg/weblate/discussions) * Email us at [care@weblate.org](mailto:care@weblate.org)

Metadata

Created: 2022-03-04T21:15:31Z
Modified: 2024-11-19T18:28:54Z
Source: https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2022/03/GHSA-3872-f48p-pxqj/GHSA-3872-f48p-pxqj.json
CWE IDs: ["CWE-77", "CWE-88"]
Alternative ID: GHSA-3872-f48p-pxqj
Finding: F422
Auto approve: 1