Описание
The package ungit before 1.5.20 are vulnerable to Remote Code Execution (RCE) via argument injection. The issue occurs when calling the /api/fetch endpoint. User controlled values (remote and ref) are passed to the git fetch command. By injecting some git options it was possible to get arbitrary command execution.
Ссылки
- Broken LinkRelease NotesThird Party Advisory
- ExploitPatchThird Party Advisory
- Release NotesThird Party Advisory
- Broken LinkRelease NotesThird Party Advisory
- ExploitPatchThird Party Advisory
- Release NotesThird Party Advisory
Уязвимые конфигурации
Конфигурация 1Версия до 1.5.20 (исключая)
cpe:2.3:a:ungit_project:ungit:*:*:*:*:*:node.js:*:*
EPSS
Процентиль: 89%
0.04231
Низкий
8.8 High
CVSS3
6.5 Medium
CVSS2
Дефекты
CWE-88
Связанные уязвимости
EPSS
Процентиль: 89%
0.04231
Низкий
8.8 High
CVSS3
6.5 Medium
CVSS2
Дефекты
CWE-88