Описание
git-fastclone before 1.0.5 passes user modifiable strings directly to a shell command. An attacker can execute malicious commands by modifying the strings that are passed as arguments to "cd " and "git clone " commands in the library.
Ссылки
- Third Party AdvisoryVDB Entry
- Vendor Advisory
- ExploitThird Party Advisory
- Third Party AdvisoryVDB Entry
- Vendor Advisory
- ExploitThird Party Advisory
Уязвимые конфигурации
Конфигурация 1Версия до 1.0.5 (исключая)
cpe:2.3:a:squareup:git-fastclone:*:*:*:*:*:*:*:*
EPSS
Процентиль: 86%
0.02758
Низкий
9.8 Critical
CVSS3
10 Critical
CVSS2
Дефекты
CWE-77
Связанные уязвимости
CVSS3: 9.8
github
больше 7 лет назад
Git-fastclone passes user modifiable strings directly to a shell command
EPSS
Процентиль: 86%
0.02758
Низкий
9.8 Critical
CVSS3
10 Critical
CVSS2
Дефекты
CWE-77