CVE-2022-25648Argument Injection in GIT

CWE-88Argument Injection6 documents5 sources
Severity
9.8CRITICALNVD
EPSS
4.3%
top 11.13%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedApr 19
Latest updateApr 20

Description

The package git before 1.11.0 are vulnerable to Command Injection via git argument injection. When calling the fetch(remote = 'origin', opts = {}) function, the remote parameter is passed to the git fetch subcommand in a way that additional flags can be set. The additional flags can be used to perform a command injection.

CVSS vector

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:HExploitability: 3.9 | Impact: 5.9

Affected Packages6 packages

CVEListV5git/gitunspecified1.11.0
NVDgit/git< 1.11.0
RubyGemsgit/git< 1.11.0
debiandebian/ruby-git< ruby-git 1.13.1-1 (bookworm)

Also affects: Debian Linux 10.0, Fedora 34, 35, 36

Patches

🔴Vulnerability Details

3
GHSA
Command injection in ruby-git2022-04-20
OSV
Command injection in ruby-git2022-04-20
OSV
CVE-2022-25648: The package git before 12022-04-19

📋Vendor Advisories

2
Red Hat
ruby-git: package vulnerable to Command Injection via git argument injection2022-04-13
Debian
CVE-2022-25648: ruby-git - The package git before 1.11.0 are vulnerable to Command Injection via git argume...2022