Логотип exploitDog
bind:CVE-2022-36069
Консоль
Логотип exploitDog

exploitDog

bind:CVE-2022-36069

Количество 5

Количество 5

ubuntu логотип

CVE-2022-36069

больше 3 лет назад

Poetry is a dependency manager for Python. When handling dependencies that come from a Git repository instead of a registry, Poetry uses various commands, such as `git clone`. These commands are constructed using user input (e.g. the repository URL). When building the commands, Poetry correctly avoids Command Injection vulnerabilities by passing an array of arguments instead of a command string. However, there is the possibility that a user input starts with a dash (`-`) and is therefore treated as an optional argument instead of a positional one. This can lead to Code Execution because some of the commands have options that can be leveraged to run arbitrary executables. If a developer is exploited, the attacker could steal credentials or persist their access. If the exploit happens on a server, the attackers could use their access to attack other internal systems. Since this vulnerability requires a fair amount of user interaction, it is not as dangerous as a remotely exploitable o...

CVSS3: 7.3
EPSS: Низкий
nvd логотип

CVE-2022-36069

больше 3 лет назад

Poetry is a dependency manager for Python. When handling dependencies that come from a Git repository instead of a registry, Poetry uses various commands, such as `git clone`. These commands are constructed using user input (e.g. the repository URL). When building the commands, Poetry correctly avoids Command Injection vulnerabilities by passing an array of arguments instead of a command string. However, there is the possibility that a user input starts with a dash (`-`) and is therefore treated as an optional argument instead of a positional one. This can lead to Code Execution because some of the commands have options that can be leveraged to run arbitrary executables. If a developer is exploited, the attacker could steal credentials or persist their access. If the exploit happens on a server, the attackers could use their access to attack other internal systems. Since this vulnerability requires a fair amount of user interaction, it is not as dangerous as a remotely exploitable one.

CVSS3: 7.3
EPSS: Низкий
msrc логотип

CVE-2022-36069

4 месяца назад

Poetry Argument Injection vulnerability can lead to local Code Execution

CVSS3: 7.3
EPSS: Низкий
debian логотип

CVE-2022-36069

больше 3 лет назад

Poetry is a dependency manager for Python. When handling dependencies ...

CVSS3: 7.3
EPSS: Низкий
github логотип

GHSA-9xgj-fcgf-x6mw

больше 3 лет назад

Poetry Argument Injection can lead to Local Code Execution

CVSS3: 7.3
EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
ubuntu логотип
CVE-2022-36069

Poetry is a dependency manager for Python. When handling dependencies that come from a Git repository instead of a registry, Poetry uses various commands, such as `git clone`. These commands are constructed using user input (e.g. the repository URL). When building the commands, Poetry correctly avoids Command Injection vulnerabilities by passing an array of arguments instead of a command string. However, there is the possibility that a user input starts with a dash (`-`) and is therefore treated as an optional argument instead of a positional one. This can lead to Code Execution because some of the commands have options that can be leveraged to run arbitrary executables. If a developer is exploited, the attacker could steal credentials or persist their access. If the exploit happens on a server, the attackers could use their access to attack other internal systems. Since this vulnerability requires a fair amount of user interaction, it is not as dangerous as a remotely exploitable o...

CVSS3: 7.3
1%
Низкий
больше 3 лет назад
nvd логотип
CVE-2022-36069

Poetry is a dependency manager for Python. When handling dependencies that come from a Git repository instead of a registry, Poetry uses various commands, such as `git clone`. These commands are constructed using user input (e.g. the repository URL). When building the commands, Poetry correctly avoids Command Injection vulnerabilities by passing an array of arguments instead of a command string. However, there is the possibility that a user input starts with a dash (`-`) and is therefore treated as an optional argument instead of a positional one. This can lead to Code Execution because some of the commands have options that can be leveraged to run arbitrary executables. If a developer is exploited, the attacker could steal credentials or persist their access. If the exploit happens on a server, the attackers could use their access to attack other internal systems. Since this vulnerability requires a fair amount of user interaction, it is not as dangerous as a remotely exploitable one.

CVSS3: 7.3
1%
Низкий
больше 3 лет назад
msrc логотип
CVE-2022-36069

Poetry Argument Injection vulnerability can lead to local Code Execution

CVSS3: 7.3
1%
Низкий
4 месяца назад
debian логотип
CVE-2022-36069

Poetry is a dependency manager for Python. When handling dependencies ...

CVSS3: 7.3
1%
Низкий
больше 3 лет назад
github логотип
GHSA-9xgj-fcgf-x6mw

Poetry Argument Injection can lead to Local Code Execution

CVSS3: 7.3
1%
Низкий
больше 3 лет назад

Уязвимостей на страницу