Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

redhat логотип

CVE-2026-28292

Опубликовано: 10 мар. 2026
Источник: redhat
CVSS3: 8.8
EPSS Низкий

Описание

A vulnerability was discovered in the simple-git Node.js library. The issue is caused by improper validation of user-supplied input when constructing Git commands. An attacker able to supply specially crafted repository URLs or arguments could exploit Git’s ext:: protocol handler to execute arbitrary commands on the underlying system. This flaw bypasses earlier mitigations intended to restrict unsafe Git protocols. By injecting configuration options that re-enable the ext:: protocol, an attacker could cause the application to execute arbitrary external commands through the Git client. If a vulnerable application passes untrusted input to simple-git operations such as repository cloning or fetching, a remote attacker could exploit this flaw to execute arbitrary commands on the host system with the privileges of the application process.

Меры по смягчению последствий

Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base, or stability.

Затронутые пакеты

ПлатформаПакетСостояниеРекомендацияРелиз
Logging Subsystem for Red Hat OpenShiftopenshift-logging/elasticsearch6-rhel9Affected
Logging Subsystem for Red Hat OpenShiftopenshift-logging/elasticsearch-operator-bundleAffected
Logging Subsystem for Red Hat OpenShiftopenshift-logging/elasticsearch-proxy-rhel9Affected
Logging Subsystem for Red Hat OpenShiftopenshift-logging/elasticsearch-rhel9-operatorAffected
Logging Subsystem for Red Hat OpenShiftopenshift-logging/kibana6-rhel8Affected
Logging Subsystem for Red Hat OpenShiftopenshift-logging/logging-curator5-rhel9Affected
Red Hat Enterprise Linux 8grafanaAffected
Red Hat Enterprise Linux 9grafanaAffected
Red Hat JBoss Enterprise Application Platform 8org.keycloak-keycloak-parentNot affected
Red Hat JBoss Enterprise Application Platform Expansion Packorg.keycloak-keycloak-parentNot affected

Показывать по

Дополнительная информация

Статус:

Important
Дефект:
CWE-76
https://bugzilla.redhat.com/show_bug.cgi?id=2446162simple-git: simple-git: Remote Code Execution via bypass of prior security fixes

EPSS

Процентиль: 27%
0.00096
Низкий

8.8 High

CVSS3

Связанные уязвимости

CVSS3: 9.8
nvd
17 дней назад

`simple-git`, an interface for running git commands in any node.js application, has an issue in versions 3.15.0 through 3.32.2 that allows an attacker to bypass two prior CVE fixes (CVE-2022-25860 and CVE-2022-25912) and achieve full remote code execution on the host machine. Version 3.23.0 contains an updated fix for the vulnerability.

CVSS3: 9.8
github
17 дней назад

simple-git has blockUnsafeOperationsPlugin bypass via case-insensitive protocol.allow config key enables RCE

EPSS

Процентиль: 27%
0.00096
Низкий

8.8 High

CVSS3