CVE-2022-24439Improper Input Validation in Project Gitpython

Severity
9.8CRITICALNVD
EPSS
68.9%
top 1.36%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedDec 6
Latest updateAug 11

Description

All versions of package gitpython are vulnerable to Remote Code Execution (RCE) due to improper user input validation, which makes it possible to inject a maliciously crafted remote URL into the clone command. Exploiting this vulnerability is possible because the library makes external calls to git without sufficient sanitization of input arguments.

CVSS vector

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:HExploitability: 3.9 | Impact: 5.9

Affected Packages3 packages

debiandebian/python-git< python-git 3.1.30-1+deb12u2 (bookworm)+1

Also affects: Debian Linux 10.0, Fedora 36, 37, 38

🔴Vulnerability Details

6
OSV
GitPython vulnerable to remote code execution due to insufficient sanitization of input arguments2023-08-11
GHSA
GitPython vulnerable to remote code execution due to insufficient sanitization of input arguments2023-08-11
OSV
CVE-2023-40267: GitPython before 32023-08-11
OSV
GitPython vulnerable to Remote Code Execution due to improper user input validation2022-12-06
GHSA
GitPython vulnerable to Remote Code Execution due to improper user input validation2022-12-06

📋Vendor Advisories

5
Red Hat
GitPython: Insecure non-multi options in clone and clone_from is not blocked2023-08-11
Ubuntu
GitPython vulnerability2023-03-22
Debian
CVE-2023-40267: python-git - GitPython before 3.1.32 does not block insecure non-multi options in clone and c...2023
Red Hat
GitPython: improper user input validation leads into a RCE2022-12-05
Debian
CVE-2022-24439: python-git - All versions of package gitpython are vulnerable to Remote Code Execution (RCE) ...2022

📄Research Papers

2
CTF
easy / README
CTF
Editorial / README