Command Injection vulnerability in git-interface@2.1.1 in GitHub repository yarkeev/git-interface prior to 2.1.2. If both are provided by user input, then the use of a `--upload-pack` command-line argument feature of git is also supported for `git clone`, which would then allow for any operating system command to be spawned by the attacker.
References
Link | Resource |
---|---|
https://github.com/yarkeev/git-interface/commit/f828aa790016fee3aa667f7b44cf94bf0aa8c60d | Patch Third Party Advisory |
https://huntr.dev/bounties/cdc25408-d3c1-4a9d-bb45-33b12a715ca1 | Exploit Mitigation Third Party Advisory |
Configurations
Information
Published : 2022-04-22 11:15
Updated : 2022-05-04 09:27
NVD link : CVE-2022-1440
Mitre link : CVE-2022-1440
JSON object : View
CWE
CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
Products Affected
git-interface_project
- git-interface