Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-3872-f48p-pxqj

Опубликовано: 04 мар. 2022
Источник: github
Github: Прошло ревью
CVSS4: 8.7
CVSS3: 8.8

Описание

Improper Neutralization of Special Elements used in a Command ('Command Injection') in Weblate

Impact

Weblate didn't correctly sanitize some arguments passed to Git and Mercurial, which allowed changing their behavior in an unintended way.

Patches

The issues were fixed in the 4.11.1 release. The following commits are addressing it:

  • 35d59f1f040541c358cece0a8d4a63183ca919b8
  • d83672a3e7415da1490334e2c9431e5da1966842

Workarounds

Instances in which untrusted users cannot create new components are not affected.

References

For more information

If you have any questions or comments about this advisory:

Пакеты

Наименование

Weblate

pip
Затронутые версииВерсия исправления

< 4.11.1

4.11.1

EPSS

Процентиль: 82%
0.01633
Низкий

8.7 High

CVSS4

8.8 High

CVSS3

Дефекты

CWE-77
CWE-88

Связанные уязвимости

CVSS3: 7.2
nvd
почти 4 года назад

The package weblate from 0 and before 4.11.1 are vulnerable to Remote Code Execution (RCE) via argument injection when using git or mercurial repositories. Authenticated users, can change the behavior of the application in an unintended way, leading to command execution.

CVSS3: 7.2
debian
почти 4 года назад

The package weblate from 0 and before 4.11.1 are vulnerable to Remote ...

EPSS

Процентиль: 82%
0.01633
Низкий

8.7 High

CVSS4

8.8 High

CVSS3

Дефекты

CWE-77
CWE-88