Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

redhat логотип

CVE-2022-24439

Опубликовано: 05 дек. 2022
Источник: redhat
CVSS3: 9.8
EPSS Высокий

Описание

All versions of package gitpython are vulnerable to Remote Code Execution (RCE) due to improper user input validation, which makes it possible to inject a maliciously crafted remote URL into the clone command. Exploiting this vulnerability is possible because the library makes external calls to git without sufficient sanitization of input arguments.

A remote code execution vulnerability exists in Git-python. By injecting a malicious URL into the clone command, an attacker can exploit this vulnerability as the library makes external calls to git without any input sanitization. This issue leads to complete system compromise.

Отчет

Across all supported releases of Red Hat OpenStack Platform the usage of a compromised GitPython API (clone_from()) is quite limited. The only people capable of exploiting this vulnerability are system administrators. For this reason, the impact has been downgraded to medium. The impact to Red Hat OpenStack Platform 17 is rated Low as the compromised function is not in use.

Затронутые пакеты

ПлатформаПакетСостояниеРекомендацияРелиз
Red Hat Ansible Automation Platform 2python-gitpythonAffected
Red Hat OpenStack Platform 13 (Queens)GitPythonAffected
Red Hat OpenStack Platform 16.1GitPythonAffected
Red Hat OpenStack Platform 16.2GitPythonAffected
Red Hat OpenStack Platform 17.0GitPythonAffected
Red Hat Satellite 6.13 for RHEL 8python-gitpythonFixedRHSA-2023:593119.10.2023
Red Hat Satellite 6.13 for RHEL 8python-gitpythonFixedRHSA-2023:593119.10.2023

Показывать по

Дополнительная информация

Статус:

Moderate
Дефект:
CWE-94
https://bugzilla.redhat.com/show_bug.cgi?id=2151583GitPython: improper user input validation leads into a RCE

EPSS

Процентиль: 99%
0.7015
Высокий

9.8 Critical

CVSS3

Связанные уязвимости

CVSS3: 8.1
ubuntu
около 3 лет назад

All versions of package gitpython are vulnerable to Remote Code Execution (RCE) due to improper user input validation, which makes it possible to inject a maliciously crafted remote URL into the clone command. Exploiting this vulnerability is possible because the library makes external calls to git without sufficient sanitization of input arguments.

CVSS3: 8.1
nvd
около 3 лет назад

All versions of package gitpython are vulnerable to Remote Code Execution (RCE) due to improper user input validation, which makes it possible to inject a maliciously crafted remote URL into the clone command. Exploiting this vulnerability is possible because the library makes external calls to git without sufficient sanitization of input arguments.

CVSS3: 8.1
debian
около 3 лет назад

All versions of package gitpython are vulnerable to Remote Code Execut ...

CVSS3: 8.1
github
около 3 лет назад

GitPython vulnerable to Remote Code Execution due to improper user input validation

CVSS3: 9.8
fstec
около 3 лет назад

Уязвимость библиотеки Python для взаимодействия с git-репозиториями gitpython, связанная с неправильной проверкой ввода, позволяющая нарушителю внедрить вредоносный удаленный URL-адрес в команду клонирования

EPSS

Процентиль: 99%
0.7015
Высокий

9.8 Critical

CVSS3