Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2022-25648

Опубликовано: 19 апр. 2022
Источник: debian
EPSS Низкий

Описание

The package git before 1.11.0 are vulnerable to Command Injection via git argument injection. When calling the fetch(remote = 'origin', opts = {}) function, the remote parameter is passed to the git fetch subcommand in a way that additional flags can be set. The additional flags can be used to perform a command injection.

Пакеты

ПакетСтатусВерсия исправленияРелизТип
ruby-gitfixed1.13.1-1package

Примечания

  • https://github.com/ruby-git/ruby-git/pull/569

  • Fixed by: https://github.com/ruby-git/ruby-git/commit/291ca0946bec7164b90ad5c572ac147f512c7159 (v1.11.0)

  • https://security.snyk.io/vuln/SNYK-RUBY-GIT-2421270

EPSS

Процентиль: 81%
0.01598
Низкий

Связанные уязвимости

CVSS3: 8.1
ubuntu
почти 4 года назад

The package git before 1.11.0 are vulnerable to Command Injection via git argument injection. When calling the fetch(remote = 'origin', opts = {}) function, the remote parameter is passed to the git fetch subcommand in a way that additional flags can be set. The additional flags can be used to perform a command injection.

CVSS3: 9.8
redhat
почти 4 года назад

The package git before 1.11.0 are vulnerable to Command Injection via git argument injection. When calling the fetch(remote = 'origin', opts = {}) function, the remote parameter is passed to the git fetch subcommand in a way that additional flags can be set. The additional flags can be used to perform a command injection.

CVSS3: 8.1
nvd
почти 4 года назад

The package git before 1.11.0 are vulnerable to Command Injection via git argument injection. When calling the fetch(remote = 'origin', opts = {}) function, the remote parameter is passed to the git fetch subcommand in a way that additional flags can be set. The additional flags can be used to perform a command injection.

CVSS3: 9.8
github
почти 4 года назад

Command injection in ruby-git

CVSS3: 8.1
fstec
почти 4 года назад

Уязвимость библиотеки Ruby/Git интерпретатора Ruby, позволяющая нарушителю выполнить произвольный код

EPSS

Процентиль: 81%
0.01598
Низкий