Описание
OS Command Injection in async-git
The async-git package before 1.13.2 for Node.js allows OS Command Injection via shell metacharacters, as demonstrated by git.reset and git.tag. This issue may lead to remote code execution if a client of the library calls the vulnerable method with untrusted input. Ensure to sanitize untrusted user input before passing it to one of the vulnerable functions as a workaround or update async-git to version 1.13.1.
Ссылки
- https://nvd.nist.gov/vuln/detail/CVE-2021-3190
- https://github.com/omrilotan/async-git/pull/13
- https://github.com/omrilotan/async-git/pull/13/commits/611823bd97dd41e9e8127c38066868ff9dcfa57a
- https://github.com/omrilotan/async-git/pull/13/commits/a5f45f58941006c4cc1699609383b533d9b92c6a
- https://github.com/omrilotan/async-git/pull/14
- https://advisory.checkmarx.net/advisory/CX-2021-4772
- https://www.npmjs.com/package/async-git
Пакеты
Наименование
async-git
npm
Затронутые версииВерсия исправления
< 1.13.2
1.13.2
Связанные уязвимости
CVSS3: 9.8
nvd
около 5 лет назад
The async-git package before 1.13.2 for Node.js allows OS Command Injection via shell metacharacters, as demonstrated by git.reset and git.tag.